
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
@progress/kendo-vue-buttons
Advanced tools
Important
- This package is а part of Kendo UI for Vue—a commercial UI library.
- You will need to install a license key when adding the package to your project. For more information, please refer to the Kendo UI for Vue My License page.
- To receive a license key, you need to either purchase a license or register for a free trial. Doing so indicates that you accept the Kendo UI for Vue License Agreement.
- The 30-day free trial gives you access to all the Kendo UI for Vue components and their full functionality. Additionally, for the period of your license, you get access to our legendary technical support provided directly by the Kendo UI for Vue dev team!
Start using Kendo UI for Vue and speed up your development process!
Among the many features which the Kendo UI for Vue Buttons deliver are:
For any issues you might encounter while working with the Kendo UI for Vue Buttons, use any of the available support channels:
Copyright © 2020 Progress Software Corporation and/or its subsidiaries or affiliates. All Rights Reserved.
Progress, Telerik, and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries.
FAQs
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.