|
||||||
|
||
|
Home > Database monitoring software |
Related keywords: database, monitoring, Database, Monitoring, monitoring software, network monitoring, internet monitoring, DATABASE, web database, database management |
|
|
1. | Atropos-SB 2005.05.27 (cyteg.com) | ||
computer. The information on the recorded talks is kept in the database. Viewing the database and talks playing are possible without interrupting the information recording. The database does not occupy much room: owing to the Voice Activated System (VAS) recording starts only with a signal while the algorithms sound compression, essentially reduce the necessary | |||
Updated: 9, 2005 | Rating: 42 | Author: Viktor Korokhin | Size: 1204 kb | Shareware Go to category: Audio & Multimedia > Rippers & Converters Similar programs | |||
2. | Clone Download Killer 1.0 (cequal2000.com) | ||
you could see whether you had download the file before . CDK also monitor the click in Internet Explorer , as you click a file type like ".exe;.Zip;.Rar..." , I would automatically check this url , find duplicate files in local database and show the report to you. CDK fully support Internet Explorer,FlashGet,NetAnts,Go!Zilla,ReGet,GetRight, Download Accelerator, monitor | |||
Updated: 9, 2005 | Rating: 436 | Author: Cequal Chan | Size: 2053 kb | Shareware Go to category: Audio & Multimedia > Multimedia Creation Tools Similar programs | |||
3. | Expired Domain Sleuth 4.71 (expireddomainsleuth.com) | ||
valuable domain names. First, find expired domain names by using a database of expired and onhold domains. Or find domains that are listed on any of the majore search engines or directories. Do a domain name check to check domain name availability. Next filter the domains by doing checking links | |||
Updated: 2, 2006 | Rating: 42 | Author: Customer Service | Size: 1001 kb | Shareware Go to category: Network & Internet > Search/Lookup Tools Similar programs | |||
4. | Penguin Monitor 8s 1.20 (acmetoolz.com) | ||
Monitor 8s uses a secure SSH connection for monitoring up to 8 Linux/Unix servers on your LAN or across the Internet. It runs on a Windows system tray. It connects to each server in required time intervals and checks for interesting information, e.g. important / critical process availability (database, httpd etc.), number of users, uptime or storage capacity. Based on | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | ShrinkerStretcher for MS Access 2000 2000.92 (peterssoftware.com) | ||
you can develop applications without concern for your end user's display settings! Scale your 800x600 application up to 1024x768, or to any other resolution. ShrinkerStretcher supports varied display settings including any resolution, small-large-custom fonts, wide scroll bars, thick borders, and more. Use ShrinkerStretcher dynamically, to rescale your forms at every resize | |||
Updated: 9, 2005 | Rating: 133 | Author: Peter De Baets | Size: 552 kb | Shareware Go to category: Development > Other Similar programs | |||
6. | Web Link Monitor 1.00s (offsitelabs.com) | ||
Site, IP device monitoring system with scheduling, reporting, and database management. Schedule links or devices on desired frequency. Generate daily reports. Scan pages for text, missing text, ping sites, check for file availability. Web Site, IP device monitoring system with | |||
Updated: 9, 2005 | Rating: 0 | Author: R. Copeland | Size: 5900 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
7. | Absence Management System 5.0.0.10 (amslive.com) | ||
software application that manages the recording, controlling and monitoring of employee | |||
Updated: 2, 2006 | Rating: 225 | Author: Developers Developers | Size: 18546 kb | Demo Go to category: Business > Accounting & Finance Similar programs | |||
8. | c:JAM - Central Jet Accounts Manager 1.4 (jomdev.de) | ||
and user account-management tool for organizations that use MS Jet databases such as MS Access and some VB applications. Using a two-paned Explorer-style interface, c:JAM lets you organize workgroups, authorize user access and manage your various datasources. Features include drag-and-drop, context menus, automatic PID and password generation, usage monitoring, OLE Automation | |||
Updated: 9, 2005 | Rating: 0 | Author: Johannes Mueller | Size: 2616 kb | Shareware Go to category: Business > Other Similar programs | |||
9. | Cynapse InfoCryptor 1.50 (cynapse.co.in) | ||
A master password restricts access to the entire information database of the user. Apart from its various levels of security, InfoCryptor implements an optimised 448 bit encryption system, giving you military strength & security. InfoCryptor's easy to use Export / Import feature and its backup solution make secure portability and exchange of information a breeze | |||
Updated: 9, 2005 | Rating: 39 | Author: Apurva Roy Choudhury | Size: 5732 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
10. | Fleet Maintenance Pro 7.0 (mtcpro.com) | ||
is performed, a detailed entry is recorded to the vehicle's history report. Track maintenance for an unlimited number of vehicles and/or equipment. Departments can also be defined to categorize the vehicles. Assign an unlimited number of user-definable maintenance items for each vehicle. These items can be tracked by month, mileage, or hour intervals. An import utility is | |||
Updated: 9, 2005 | Rating: 120 | Author: Brian Kennedy | Size: 6488 kb | Shareware Go to category: Business > Project Management Similar programs | |||
|
Home > Database monitoring software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|