With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Field Service+ for MS Dynamics 365 & Salesforce
Empower your field service with mobility and reliability
Resco’s mobile solution streamlines your field service operations with offline work, fast data sync, and powerful tools for frontline workers, all natively integrated into Dynamics 365 and Salesforce.
SAADA transforms a set of heterogeneous astronomical data FITS files in a powerfull database deployed on the Web and including VO features. The database is located on your host and keeps under your full control. This job doesn't require to write cod
SYMPLiK RANGEHOOD is a Javadoc-like tool for Oracle database. This pure-Java program "sucks up" data dictionary and object source code from database and generate document for Tables, Views, Triggers, Packages, Procedures, Functions, and others.
Abacus Technologies Relational XQuery is an XQJ compatible XQuery processor that provides the ability to execute XQuery against both relational and XML data sources. Relational data can be transformed to any XML schema using XQuery's powerful features.
AJAX JDBC ResultSet in Javascript. Uses XMLHTTP to send xml server data to a web browser HTML form with no refresh, reload or submit (like Google Suggest). Data can be SQL, object relational map (like Hibernate), XML, other mapping (like SOAP)
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: