Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
WOSH is a multi-platform message-oriented middleware written in ANSI C++. Service oriented architecture, designed for network distributed computing. Already working: Audio multimedia, X10, remote control (WinMobile, GTalk) and much more..
Retrieve files from a remote computer using a PDA/Pocket PC running Windows Mobile.
Can access remote computers regardless the geographical position. Can work under WiFi, GPRS or any other wireless networks.
A QNX-based library and tools for controlling Märklin Digital model railroads over a serial interface. The Project includes a shell for interactive control and also bootable floppy disk image to easily turn any pc into a dedicated railroad controller.
.NET VNC Viewer is a VNC viewer written entirely in C#. It is binary compatible with Smartphones, Pocket PCs and Windows desktops (.NET CF or .NET Framework). I write this because other VNC viewers on Pocket PC do not do full screen and screen rotation.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
This project provides a tool that can monitor and control your pc screen using your mobile phone.
You can monitor the pc's screen, and your touching actions on mobile screen are acted and simulated as mouse's clicking on pc's screen.