Gratuit pour 25 000 utilisateurs avec intégration Okta illimitée : concentrez-vous sur le développement de vos applications.
Vous l'avez demandé, nous l'avons fait ! Les versions gratuite et payante d'Auth0 incluent des options qui vous permettent de développer, déployer et faire évoluer vos applications en toute sécurité. Utilisez Auth0 dès maintenant pour découvrir tous ses avantages.
Essayez Auth0 gratuitement
AI-based, Comprehensive Service Management for Businesses and IT Providers
Modular solutions for change management, asset management and more
ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
Strasheela is a constraint-based music composition system. The user defines music theories by sets of compositional rules and the system creates music which complies with these theories. User-interface is the programming language Oz.
The Open Descent Foundation (ODF) is a community for developers, who want to help to create open source programs, tools, etc. for the famous games Descent1, -2 or -3. Everyone can join the ODF if he accepts the idea of writing open source programs.
Multisetup is a networking application server that provides a multiple os, thin (multimedia) client based, legacy device friendly environment for home networks. Its an alternative to single OS networks and XP Media Center.
Powerful Website Security | Continuous Web Threat Platform
Continuously detect, prioritize, and validate web threats to quickly mitigate security, privacy, and compliance risks.
Reflectiz is a comprehensive web exposure management platform that helps organizations proactively identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. Designed to address the growing complexity of modern websites, Reflectiz provides full visibility and control over first, third, and even fourth-party components, such as scripts, trackers, and open-source libraries that often evade traditional security tools.