Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
QXRD is software for the acquisition and analysis of X-ray data taken with 2 dimensional detectors. The software can drive a Perkin Elmer XRD series flat panel detector and can be remote-controlled via a socket interface, or directly from SPEC
JDiskMark is a powerful and versatile disk benchmarking tool written in Java, designed to help accurately measure the performance of your storage devices across different operating systems. Whether you're testing HDDs, SSDs, or network drives, JDiskMark provides reliable insights into your disk's read and write...
Software oscilloscope using Python and tkinter. Supports multiple sources: socket, file, audio, USB. Displays data by samples, time or frequency. Scales the input automatically or manually.
Software oscilloscope using Python and tkinter. Supports multiple sources: socket, file, audio, USB. Displays data by samples, time or frequency. Scales the input automatically or manually. It has been renamed "pdatascope" to avoid a name-clash with Pyscope, a scoping package on PyPi. See https://sourceforge.net/p/pydatascope/ for the latest code.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.