One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Doppioni searches for duplicates in your disks. I wrote Doppioni as exercise, after one year without coding in Java. At the moment is just an alpha version. Help would be very apreciated.... want to join this project?
A Java Programm to sort JPEG-Images from digital still image cameras. The sorting is done by the capture date/time of the EXIF-Header. Image meta informations from EXIF-Header is stored in a database. Double files will be recognized by MD5-hash compare.
This is a mechanism for fast, incremental backup of web sites that allow CGI scripts and FTP access but no direct shell access, with better performance than solutions based solely on ftp.
Defuddle is a data translation engine that supports mapping arbitrary ASCII and binary file formats to a data model defined in XML Schema in a manner similar to, but not compliant with the Data Format Description Language (http://www.ogf.org/dfdl/).
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
An easy to use application for backing up files to multiple locations, including Amazon's S3. Runs on Windows, OS X and Linux. Bonkey is based on the Eclipse RCP and equires Java. Downloads at http://thebackupmonkey.blogspot.com
A simple, extensible GUI archiver for experimental cmd-line tools.
Coffeearc is a simple, extensible GUI archiver for cmd-line tools. Bundled with CCM and Slug, both ultra-fast and strong compression (including AES encryption) are its core features. Some conventional formats like ZIP, TAR and others are supported.
mysql_innodb_backup is just an 'automation' and 'simplification' of existing MySQL server command tools. It can be called with one line to backup or restore InnoDB or MyISAM databases without interrupting operations.
Zonomania is a webbased application to document a SAN (Storage Area Network) environment.
It is powerful in the hand of a SAN Administrator to manage, engineer and plan a SAN.
This project is an attempt to create a wrapper between filesystem code for one operating system and compile it for another. For example, a Linux filesystem driver could work natively in Windows if the project goes as planned.
Parallel and atomic backup utility with web-based management. Written in PHP for simplicity in modifying and extending the framework. Multithreads not-so-multithreaded processes like rdiff-backup, rsync and SSH to decrease backup windows.
This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
disk manager is a CD/DVD archiving tool. It storys the directory contents of any media so you can search it later. Its also designed as file explorer which makes it easy to find big files. Windows Version supports native file context menus.
NoAds FileUnpacker is a free software tool to unpack archives created with TM FilePacker. It does not install any unwanted software on your computer and runs on every Java-supported platform (Windows, Mac, Linux and others).
The Java PHOto ARchiver: Archive and sort your photos, don't be anoyed with those creepy image names. Drag&Drop support, red eye removal, create your photograph(pasfoto). Just Drag&Drop your photos into or out of your archive
Monitoring (checking, validating) the integrity of data on a storage device based on hash signatures generated earlier for all files to be monitored. The validation process can be started manually or automatically by using a schedule.
DWIP is short for Disk Wiping and Imaging Tool. This tool is being built for Mississippi State Universities National Forensics Training Center for use on a live cd to give out to it's students.