With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Toolkit for rapid XML and web application development
Toolkit for rapid XML and web application development including a full XForms 1.1 implementation and a rich set of widget and layout-containers. Extensible interfaces for integration of custom controls, functions and data connectors.
DocFlower can be used to create the UI for application based on Eclipse RCP. It uses XML, XSLT, XSD to define the the UI, bind it to data, and helps utilize rich RCP services declarative.
Get your database online quickly using configuration not code. Use this secure, scalable and proven enterprise technology to publish any relational data, any custom process on the internet. MySQL, Java, XML, XSL. xHTML GUI, beta voiceXML and WML/WAP.
Xeditium is a framework of extensible XML document editior/browser with Swing and Web interfaces on a recursive bootstrap mechanism of JavaWebStart. It launches Tapestry/Jetty httpd internally and serves dynamic generated JNLP files.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.