You Might Also Like
Employee monitoring software with screenshots Icon
Employee monitoring software with screenshots

Clear visibility and insights into how employees work. Even remotely

Our computer monitoring software allows employees, field contractors, and freelancers to manually clock in when they begin working on an assignment. The application will take screenshots randomly or at set intervals, which allows employers to observe the work process. The application only tracks activity when the employee is clocked in. No spying, only transparency.
Build IoT Your Way Icon
Build IoT Your Way

Quickly build, secure, and manage connected devices from anywhere with the Golioth IoT Cloud.

Connect and secure devices, send sensor data to the web, update firmware over the air, and scale your fleet with our instant IoT cloud.
The 3D Catalog Platform Driving Qualified Leads for Industrial Manufacturers Icon
The 3D Catalog Platform Driving Qualified Leads for Industrial Manufacturers

With eCATALOGsolutions, you can deliver configurable 3D models and 3D PDFs to your prospects on-demand in the CAD and BIM formats they require.

Get your products spec’d in by delivering 3D CAD models of the products you sell on your website. Today’s industrial buyers require on-demand product data, instant CAD & BIM downloads, and high-quality product images.
Telehealth and Radiology are 130 Years Old. Time to update your system? Icon
Telehealth and Radiology are 130 Years Old. Time to update your system?

TeleRay products allow for the viewing or transfer of DICOM images during telehealth visits.

TeleRay transfers patient studies faster and more securely than any other method.
Powerful, all-in-one identity verification, fraud prevention and compliance platform. Icon
Powerful, all-in-one identity verification, fraud prevention and compliance platform.

For businesses needing an automated identity verification to defeat fraud while processing customers' data quickly and securely

iDenfy protects startups, financial institutions, gambling, streaming, ridesharing, and other digital services from identity fraud using a three-layer identity verification process. The process protects businesses from the most threatening forms of identity fraud.

Additional Details for CodeLite

Operating Systems

Linux, BSD, Windows

Intended Audience

Developers

User Interface

wxWidgets

Programming Language

C++, C, PHP

Registered

2007-07-30

Last Updated

Categories

Integrated Development Environments (IDE), Text Processing, Build Tools

Maintainers

dghart, eranif

Keep Me Updated!