With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gen AI apps are built with MongoDB Atlas
Build gen AI apps with an all-in-one modern database: MongoDB Atlas
MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
FileDrop - A multiuser upload/download file sharing webapplication with progress bar and virus checking. Web-based file-manager/ftp site. Allows you to manage and/or share files over the internet, or an intranet.
Tpl makes it easy to serialize your C data using just a handful of API functions. The data is stored in its native binary form for maximum efficiency. C, Perl and XML supported. Data is portable across CPU types and OS's from Unix to Mac to Windows.
Webstats Solr is an attempt to make Apache Access log easier to Data Mine. By adding a powerful Search Engine (SOLR) as a Backend and using Java Script and HTML and maybe PHP I hope to out date AWStats.
A log player for "The Fourth Coming" ("T4C", http://www.the4thcoming.com).
Given a log-file, this tool will replay a T4C game you've played before.
It will have built-in functionnalities like : merging log files
together, searching and cleaning
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
a java based monitoring tool,logs all the user actions and errors with runtime data, displays execution performance and executed method lines. It doesnt modifiy class source files and no need for coding, just put it in your class path and see the mir
OneCMDB is an open source CMDB, Configuration Management Database. It keeps track of assets, documents, etc. and relations. The CMDB Model can be changed on the fly and networks can be auto-discovered. Integrated with NAGIOS. ITIL compliant.
Laika analyzes and reports on the interoperability capabilities of EHR systems. This includes the testing for certification of EHR software products and networks.
Hyper9 VMM is a free and open source solution to manage VMware VI3/vSphere4, Citrix XenServer 5 or Microsoft Hyper-V from your mobile device or cell phone.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
NEP is a network management software platform based on Netconf protocol. It implements all the basic functions of Netconf. Also, it is hithly scalable and the program structure allows users to conveniently carry out the secondary development.
Celeritas is a web development framework built on top of Web Macro to speed up the development process. It helps reduce the burden of doing the regular operations by taking care of the repeatitive tasks.
More details coming soon
The WAW tools provide a more automated approach to web harvesting, based on archival principles, automated process and human decision-making. The model seeks to use archival principles to preserve documents on the web.
FOAFRealm (also called D-FOAF in version 2.0) is a distributed user profile management system based on FOAF. FOAFRealm is a set of tools that enables to manipulate FOAF (Friend-of-a-Friend) information within J2EE application and provides Realm implement
Webclient is a novel client which provides web interface
to the resources provided through UNICORE 6. The Webclient takes advantage
of the UNICORE client API and technologies such as AJAX, JSP,
and JavaScript frameworks.
Narrows search result produced by popular Internet search engines, allowing to put extra filtering conditions, as certain words presented, certain words excluded, and so on.
Web based archiving system for community radio stations. Includes podcasting, xml indexes, complete control over accessibility of content. Programmers can place descriptions of individual shows. Administrator can control downloadability, whether podcast.
A PHP application to search for matching strings in log files. It was mainly designed for usage in a syslog server environment with big log files, where you cannot log to databases due to the size, but to plain text files which will be searched.
MelaJò Portal Framework is a framework to develop Java Enterprise/J2EE/MVC based applications rapidly and easily.
It's based on Finite State Machine concept. It's used for years
to create real business web applications with J2EE architecture.
This is a php/ajax application that lists groups on a Leopard Mac OS X Server Open Directory. The user can then choose a group to manage and add or remove members to the group.
Sabuesonix is a desktop search engine. It can explore your PDF, TXT and HTML files (and more in the future) and create an index for quick documents search.
The melody manager is a webapplication which indexes music and makes it accessible over the internet. Music is organised into artists, albums and playlists. Eventually the system will expand the users music collection based on their likes and dislikes.
RoofTop is a network/systems monitoring (NSM) tool that leverages SNMP standards to deliver critical health and performance monitoring through device based reports and graphs, event notifications, alerts, and configurable alarm thresholds.