Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
An ontology-centered framework within the Semantic Web infrastructure that aims at standardizing various knowledge involved in the biological modeling processes. Three biological cases have been developed to evaluate the implementation of this framework.
SyncDocs provides a simple point-and-click drag-and-drop HTTP server for transferring files between computers, or especially to applications on an iPhone. No DNS or IP settings are required: SyncDocs uses the Bonjour service discovery protocol.
This chess program changes its strength to give the best match against you. Eventually it learns to beat you specifically through learning alogirthms. Features included transposition tables and a elementary 3-piece endgame tablebase.
Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
A Controlled Language Programming (CLP) compiler, runtime engine, and development IDE for writing software in a natural (but somewhat restricted) language that clearly represents the real world concerns and maps to a 3GL (Java/Groovy) for execution.
FeyaSoft introduce a simple, qualify template to build dynamic web application. It integrates the latest technologies such as Ajax (Extjs), spring, Hibernate to build dynamic web2.0 desktop application.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Pikk - Object Relational Mapping ( ORM ) Framework Pikk’s primary feature is Object-Relational mapping from Java classes to database tables and from Java data types to SQL data types.
This software is related to ST-Guide project, an initiative arisen at the Institute of Computing of State University of Campinas (IC-UNICAMP) to solve the practice guideline formalization and implementation problems.
¡COSA! is a project to create a Common Objects Service API for web development. By using ¡COSA! a programmer will not have to worry about rewriting and rebuilding his WSDL file all the time, worrying only about what really matters: coding business rule
G.A.V. (Graph Algorithm Visualizer) is a tool that visualizes algorithms from graph theory. A step-by-step visualization from each different algorithm allows the user to understand the particular algorithm very easily.
Javast is a Java API for creating an Abstract Syntax Tree of java source code (the equivalent of an XML DOM) in memory and then writing this to a file or bytestream as formatted source code.
It is mainly useful for java code generation.
Contelligent is a J2EE content management system that is targeted at developers and integrators. It provides an advanced package mechanism for development and deployment of Contelligent projects and extensions.
Like the well-known tee program on UNIX systems, HttpTea is sitting between the client and the server of a HTTP connection. It allows you to modify the requests and responses before submission. HTTPS traffic can be decrypted an displayed as well.