Find out just how much your login box can do for your customer | Auth0
With over 53 social login options, you can fast-track the signup and login experience for users.
From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
Sign up
Houzz Pro is the #1 business management software for home construction and design professionals.
Get the all-in-one tool for marketing, project and client management built specifically for remodeling and design professionals.
Get an all-in-one solution that spans the full customer lifecycle, including marketing, CRM, estimation & proposal building, project management, a 3D Floor Plan builder, an online invoicing and payment portal, as well as a client portal and collaboration tools. Start a free trial today to see why thousands of Pros run their business on Houzz Pro. Plans available for all business sizes.
zClipse is a project for building Eclipse (http://www.eclipse.org) plugins. Plugins currently being developed include:
TabNavigator - editor enhancements;
JScheme - Scheme integration;
Insectivore - shared TeamTasks, integrated with Tasks view.
The Medlane project is an attempt to create a set of tools that will enable librarians to move from the standard MARC (MAchine Readable Cataloging) format to a new library/museum XML format. This move will ensure traditional library/museum data remains
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.