Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
phpAnnotations provides Annotations support similar to Java or C# in your PHP projects. Annotations gives you the ability to add meta information/configuration to your classes by readable at runtime using reflections.
Card sort research has applications in psychology, web development, and market research. Here, we offer a digital card sorting tool with a simple, user friendly interface and powerful analysis tools.
We concentrate on a flexible, multi-purpose sort.
phpAjaxTags is a port to PHP from advanced java tag library "AjaxTags" (ajaxtags.sourceforge.net). To install - just extract zip file into Your root www dir. On-line demo http://www.2al.pl/phpAjaxTags/
Open Source IM and voice client using Jabber and SIP protocols, with great audio quality thanks to speex and a nice and clean interface. Programmed in Java and C++. It supports chat, voice and file transfers.
Minimum string distance approximations based on a modified Wagner and Fischer least-cost trace computation of longest common subsequences with symbol transposition weighting on a QWERTY keyboard and phonetic weighting of like sounding symbols.
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: