Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Software build-automation tool written in Common Lisp
COOK is a software build-automation tool made with a goal of letting you, the programmer, to utilize the most elegant and powerful programminglanguage - Common Lisp - for managing your software builds. You write a recipe file which describes what objectives must be constructed. COOK will load and process this file, then produce either a regular Makefile or a Bourne Shell script, which will actually perform the task of building and installing your targets.
A system for computer algebra and symbolic mathematics
OpenAxiom is an open source Computer Algebra System. It offers an interactive environment, an expressive programminglanguage, a compiler, a large set of mathematical libraries of interest to researchers and practitioners of computational sciences.
Framework for making Windows applications that are one .exe file in AutoHotKey_L,C++,C#, VB.NET,Java,Groovy,Common Lisp,Nemerle,Ruby,Python,PHP,Lua,Tcl,Perl,Jint,S#,WSH VBScript,HTML/JavaScript/CSS,COM, PowerShell without compiling . For .NET 4.
Small implementation of Push 3 programminglanguage in Common Lisp. Push 3 is described here http://tinyurl.com/push30. Push is a programminglanguage intended primarily for use in evolutionary computation systems.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.