The open source Calendly alternative. Self host it, or have it hosted. Integrate it seamlessly into your business with advanced customization and an open API.
Stytch is a full stack authentication and authorization platform, whose APIs make it simple to seamlessly onboard, authenticate and engage users. Improve security and user experience by going passwordless.
Plural is an open-source DevOps platform for deploying software on Kubernetes - to public or private cloud. Provision your fleet, deploy your applications, construct release pipelines, and manage all your services in a single pane of glass. With batteries included, Plural makes continuous deployment on Kubernetes simple.
Your team is your best defense against attacks. Empower them to build safe, scalable access workflows.
Sym's approach to access management removes the pain of manual ticket queues and unmaintainable internal tools. Our low-code, DevOps-friendly workflow platform unlocks authorization tooling that is maintainable and highly customizable.
Neuro gives you access to a network of GPUs with a single API call. Get instant MLOps. ☁️ Serverless compute ⚖️ Only pay for the compute used = no more 24/7 hosting fees! ⚡️ Go from prototype to production +10x faster. Check it out at getneuro.ai
Elph is building highly scalable blockchain infrastructure. Our network of layer-2 Plasma sidechains increases the transaction throughput on Ethereum to over 5,000 transactions per second, enabling users to instantly exchange cryptocurrencies, interact in real-time with decentralized apps, and execute smart contracts at high speed and low cost.
Chill Code helps developers easily find & quickly launch, software popular within their technology community. Developers don't build TCP stacks or vector graphic libraries more - we share source on GitHub. Chill Code does the same for software infrastructure patterns. Developers fork each others patterns and launch in the cloud in one click.
Verihubs is an API-based verification that helps digital companies to verify their users using local data sources and access the users’ financial and identity information.