|
||||||
|
||
|
Home > Information architect software |
|
|
131. | cdTree 3.1.4 (vbKnowledgeSolutions.com) | ||
audio tracks and connect to an Internet CDDB to get album and track information. It also recognizes MP3 files and decodes the MP3 tags within the catalog. cdTree works in two fully customizable modes, the standard mode and an explorer mode. The tool manages many additional attributes including | |||
Updated: 9, 2005 | Rating: 1438 | Size: 5114 kb | Freeware Go to category: Audio & Multimedia > Other Similar programs | |||
132. | Chilkat Digital Certificates Component 2.0.3 (chilkatsoft.com) | ||
Certificate makes it easy to get information about the security certificates that are stored on your computer. It also allows you to easily add certificates to a certificate store, remove certificates from a store, or find a certificate that should be used for a particular purpose, such as secure email. Chilkat Certificate makes it easy to get information about the security | |||
Updated: 9, 2005 | Rating: 206 | Author: Matt Fausey | Size: 1000 kb | Freeware Go to category: Development > Other Similar programs | |||
133. | Chilkat AES & RSA Encryption Component 2.2.0 (chilkatsoft.com) | ||
from 3rd-party vendors. It also provides easy access to information about digital certificates and the ability to add and delete certificates from certificate stores found in the registry, filesystem, or even directly in memory. Chilkat Crypt is an advanced ActiveX encryption component that offers both RSA public-key encryption with digital signatures as well as symmetric | |||
Updated: 9, 2005 | Rating: 0 | Author: Matt Fausey | Size: 2000 kb | Shareware Go to category: Development > Other Similar programs | |||
134. | GoDiagram 2.2 (nwoods.com) | ||
Use GoDiagra to build custom interactive diagrams, network or process or workflow editors, flowcharts, or software design tools. GoDiagram includes many predefined kinds of nodes, links, and basic shapes including text and images. It supports layers, groups, subgraphs, scrolling, zooming, selection | |||
Updated: 9, 2005 | Rating: 0 | Size: 6800 kb | Commercial Go to category: Development > Other Similar programs | |||
135. | Mentext 1.0 (mimosil.com) | ||
developers and is supplied as a software component. Using Mentext's natural language processing capabilities, developers can enable their software to identify meaning or information conveyed in text, regardless of the words used. By utilising the capabilities of Mentext, an application can: - search a set of documents for a document about a given topic - search within a | |||
Updated: 9, 2005 | Rating: 0 | Author: Mimosil | Size: 2050 kb | Demo Go to category: Development > Other Similar programs | |||
136. | URenameIT 2.3 (particleg.com) | ||
the name, extension, or entire file name. Managing MP3 ID3 tag information has been made as simple. URenameIT provides the ability to handle version 1.x and 2.x and can perform actions such as deleting all tags, performing copies or moves between different versions of tags, and mass set tag information. File names can even be set using the internal tags from each file | |||
Updated: 9, 2005 | Rating: 0 | Author: ParticleG ParticleG | Size: 1180 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
137. | m9P Database 1.2 (mental9Production.com) | ||
Socket Layer (SSL) to protect the security of your credit card information. m9P Database is a stand-alone database builder and manager for individuals and businesses. It allows for multiple users and each database is secured by a password and by user privileges. It Can export a database to a web form for use on the | |||
Updated: 9, 2005 | Rating: 51 | Author: Khaled Aboulhosn | Size: 12566 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
138. | Secure Hive 1.1.0.0 (securehive.com) | ||
a method of: Securing sensitive documents Protecting information during transfer Securing emails Securing portions of a document (e.g. individual graphics or clauses in a contract) Protecting the integrity of your company by ensuring information is kept confidential Controlling access to documents and files using digital certificates Unlike | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Morrow | Size: 986 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
139. | wodBeep 1.0.0.0 (weonlydo.com) | ||
recieved by the peer, Profile defines parsing to provide necessary information. MESSAGES Messages are initiated by application, and are prepared by defined Profile. Corresponding profile awaits on other side to parse the message and provide only necessary information. CHANNELS All exchanges occur in the context of a channel -- a binding to a well-defined aspect of the | |||
Updated: 9, 2005 | Rating: 0 | Author: Kresimir Petric | Size: 1100 kb | Shareware Go to category: Development > Components & Libraries Similar programs | |||
140. | CleverEye 3.0 (nrgglobal.com) | ||
CleverEye is availability monitoring, alerting and reporting software. It is agent-less, Web based, supports multiple concurrent users and has flexible testing frequency. Easy to install and use. Always scalable. Four modules: NodeWatch Monitor availability and response time of your servers, routers | |||
Updated: 9, 2005 | Rating: 79 | Author: Matthew A. Peck | Size: 6136 kb | Freeware Go to category: Network & Internet > Network Monitoring Similar programs | |||
|
Home > Information architect software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|