With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
...Ransack is available in two modes: simple and advanced, allowing you to create either simple or advanced search forms. Simple mode works much like MetaSearch and is very easy to set up. The advanced mode makes use of Rails' nested attributes functionality in order to generate complex queries with nested AND/OR groupings, etc. This involves more complexity but does produce some very interesting search interfaces and puts more power in the hands of users.
Ransack is compatible with Rails 5.0, 5.1, 5.2 and 6.0, and on Ruby 2.3 and later.
Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape
...These applications show how Doorkeeper works and how to integrate with it. Start with the oAuth2 server and use the clients to connect with the server. See list of tutorials in order to learn how to use the gem or integrate it with other solutions/gems.
Framework for making Windows applications that are one .exe file in AutoHotKey_L,C++,C#, VB.NET,Java,Groovy,Common Lisp,Nemerle,Ruby,Python,PHP,Lua,Tcl,Perl,Jint,S#,WSH VBScript,HTML/JavaScript/CSS,COM, PowerShell without compiling . For .NET 4.
Rails Pig is Ruby on Rails based Analyst frontend to a Snort-MySQL database. It will be a web only console, lightly sprinkled with AJAX in order to provide near-real time event updates without annoying and slow full page refresh.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
ciperf is used to calculate the -b and -l values for iperf in order to produce a chosen udp packet throughput (overhead = 51 bytes) in respect to some variables which may change the calculation of the parameters (e.g. computers, links, ...).