|
||||||
|
||
|
Home > Defect software |
Related keywords: Defect Tracking, defect tracking |
|
|
201. | DigiCam 1.0 (cheapshareware.co.uk) | ||
Digital cameras are becoming more and more popular, especially when it comes to taking those special holiday snaps and those special moments at the children's birthday parties. Unfortunately, when it comes to actually saving them on the home computer for safe keeping, it does a poor job at Naming the | |||
Updated: 9, 2005 | Rating: 0 | Author: Ian Barber | Size: 2474 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
202. | Digital PhotoRescue Professional 3.9 (objectrescue.com) | ||
Digital PhotoRescue Professional recover lost data from whole host of multimedia devices - from digital cameras and MP3 players to PDAs and mobile phones. PhotoRescue Pro support recovery from CompactFlash cards (type I/II), IBM Microdrives, SmartMedia cards, MultiMedia cards (MMCs), Secure Digital (SD) | |||
Updated: 2, 2006 | Rating: 570 | Author: Konstantin Romanovsky | Size: 1448 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
203. | E-Service Center Manager (ESCM) - Server 2.3 (alarit.com) | ||
service industry. So, it works with "Equipment" having one or more "Defects". "Equipment" is received from "Client". After 1st stage – "Receiving", it goes to 2nd – "Estimating", where "Repairs" investigated to be done on this item – and so on. Here is brief list of stages: - receiving; | |||
Updated: 9, 2005 | Rating: 0 | Author: Claus Wagner | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
204. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
205. | Roll Call 3.15 (westbrooksoftware.com) | ||
Roll Call is an employee in and out board and a secure instant messaging system. The main fallacy of in and out boards is people forget to change their status. With Roll Call, you only need to remember to change it when you leave your desk, not when you return. When you click your mouse or type on your | |||
Updated: 2, 2006 | Rating: 0 | Author: David Westbrook | Size: 2610 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
206. | Online Services Center 2.3 (itlaurel.com) | ||
service industry. So, it works with "Equipment" having one or more "Defects". "Equipment" is received from "Client". After 1st stage "Receiving", it goes to 2nd "Estimating", where "Repairs" investigated to be done on this item and so on. Here is brief list of stages: receiving; estimating (defects and repair pricing); customer approval; dry-out (if | |||
Updated: 8, 2004 | Rating: 0 | Author: Janice Petros | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
207. | PTCompare 1.4 (PracticalTheory.com) | ||
sub-directories of course), and generate a report showing all the defects that in your destination directory or drive. Works on hard disks, diskettes, Zip drives, Jaz drives, magneto-optical drives, CD drives and the like. Suitable for beginners as well as advanced users! If you burn a lot of | |||
Updated: 3, 2005 | Rating: 0 | Author: Eitan Bar | Size: 240 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
208. | REMOTE DRiVE 1.1 (matcode.com) | ||
User Manager, CIA Unerase or CHKDSK on the remote drive or delete defect driver in the HOST-Systemdirectory. With the included User Manager you can see the detailed information about all users accounts, unlock locked users and alter their passwords. The HOST and CLIENT machines must be connected with a standard parallel link cable or null-modem serial cable. Easy administrative | |||
Updated: 9, 2005 | Rating: 16 | Author: Vitaly Evseenko | Size: 474 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
209. | Service Center Manager (SCM) - Server 2.0 (alarit.com) | ||
service industry. So, it works with "Equipment" having one or more "Defects". "Equipment" is received from "Client". After 1st stage – "Receiving", it goes to 2nd – "Estimating", where "Repairs" investigated to be done on this item – and so on. Here is brief list of stages: - receiving; | |||
Updated: 9, 2005 | Rating: 0 | Author: Max Zotov | Size: 22 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
210. | Service Center Operator 2.3 (newageit.com) | ||
service industry. So, it works with "Equipment" having one or more "Defects". "Equipment" is received from "Client". After 1st stage "Receiving", it goes to 2nd "Estimating", where "Repairs" investigated to be done on this item and so on. Here is brief list of stages: receiving; estimating (defects and repair pricing); customer approval; dry-out (if | |||
Updated: 8, 2004 | Rating: 0 | Author: Matthew Jacobson | Size: 224 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > Defect software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|