|
||||||
|
||
|
Home > Identification software |
Related keywords: name tags identification, language identification, character set identification, file identification |
|
|
471. | ieSupportManager 1.50 (iecomputersystems.ie) | ||
issues to suit their own preferred view. It also allows the user to identify unusual issues track trends and provides a comprehensive suite of reports. Easy to install and simple to use for both support staff and end users alike the system is also very competitively priced and comes with full context | |||
Updated: 2, 2006 | Rating: 0 | Author: Stephen McNamee | Size: 14336 kb | Demo Go to category: System Utilities > Other Similar programs | |||
472. | MyBooks 6.26.20 (padfile.radsoftware.org) | ||
that includes the information you need. It will even let you print identification labels that you can affix to your books. Powerful searching and sub-listing features let you find any one particular entry instantly. Or, quickly produce sub-lists of certain books by any criteria you specify | |||
Updated: 2, 2006 | Rating: 0 | Author: Rad Software | Size: 1277 kb | Commercial Go to category: Home & Hobby > Other Similar programs | |||
473. | jFolder 1.104 (SinnerComputing.com) | ||
to make your folders and drives stand out for easier identification? Customize their icons then! This program allows Windows 2000 and Windows XP users to customise the appearance of icons for drives (Win2K only) and folders. You can choose the icon and tool tip of any folder, giving the same effect (if desired) of system folders like the recycle bin or "My Documents". Normal icon | |||
Updated: 9, 2005 | Rating: 0 | Author: Andrew Glina | Size: 18 kb | Freeware Go to category: Desktop > Icons Similar programs | |||
474. | PSTCompactor - Home Edition 2.5.4 (pstcompactor.com) | ||
even after emptying the 'Deleted Items' folder - Flexible rules to identify specific items (eg zip attachments older than 30 days) - Identifies corrupt and inaccessible PSTs - Identifies large mailboxes - Locates and audits mailboxes - Mitigate legal recourse by ensuring deleted information is unrecoverable Compatible with Microsoft Outlook 98 - 2003 and is | |||
Updated: 2, 2006 | Rating: 37 | Author: Xemplify IT | Size: 4125 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
475. | Startup Select 2.0 (dummysoftware.com) | ||
manager to help you get a faster running PC. It allows you to identify, enable disable, and remove the programs located in the Registry and Startup Folders, which run automatically every time Windows starts up. Startup Select contains a builtin database of hundreds of Windows startup programs and their descriptions. Any harmful program entries are highlighted in red, notifying you | |||
Updated: 2, 2006 | Rating: 120 | Author: Kory Becker | Size: 920 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
476. | Caller ID Events 1.0 (teley.com) | ||
Caller ID Events 1.0 is a software that will tell you who the caller is - by name, by number, by picture, by sound and even by voice. general point: Caller ID- Tapi or Comm based. Hear who's call by text to speech. Blocks unwanted phone calls. Support UNKNOWN, OUTOFAREA etc.. calls formats. Calls log | |||
Updated: 9, 2005 | Rating: 16 | Author: Ron Gal | Size: 2078 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
477. | TrueUpdate 2.0.0.0 (indigorose.com) | ||
and business processes. Using a combination of custom software identification parameters and a robust client/server framework, TrueUpdate can quickly determine if an application is out-of-date. Once a required patch has been identified, the TrueUpdate client can automatically retrieve and apply it using standard Internet and/or LAN protocols. An easy-to-use Project Wizard | |||
Updated: 9, 2005 | Rating: 0 | Author: Ted Sullivan | Size: 17195 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
478. | PhotoMarker Pro 1.5 (senwa.nl) | ||
В® brand or companylogo are professional presentations. [4] Identification Photomarking offers you practical identification. Every photomark is burnt into the image and can contain information that identifies the image. For instance; you can use a photomark with object information in all imagefiles of a specific product or object. If you made 50 digital | |||
Updated: 9, 2005 | Rating: 82 | Author: senwa senwa | Size: 1357 kb | Shareware Go to category: Graphic Apps > Editors Similar programs | |||
479. | Cornolius Professional Database 1.0.300 (mental9Production.com) | ||
primary/foreign keys. A primary key is a value that can be used to identify a particular row in a table, so it should be unique and unchangeable during the course of normal operations of the database; A primary key in one table can exist as a foreign key in another table; This what constitute a | |||
Updated: 9, 2005 | Rating: 42 | Author: Khaled Aboulhosn | Size: 9396 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
480. | Duplicate Finder 3.0 (ashisoft.com) | ||
quickly than others in its class, very safe and more reliable. + Identify and recover wasted disk space. + Reduce backup time and media used for backups. + Reduce file searching time. + Remove duplicate files to eliminate synchronization problems. Find and remove true duplicate files. Search | |||
Updated: 2, 2006 | Rating: 4849 | Author: Ishtiaq Mohammed Hussain | Size: 1898 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Identification software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|