You Might Also Like
Employee monitoring software with screenshots Icon
Employee monitoring software with screenshots

Clear visibility and insights into how employees work. Even remotely

Our computer monitoring software allows employees, field contractors, and freelancers to manually clock in when they begin working on an assignment. The application will take screenshots randomly or at set intervals, which allows employers to observe the work process. The application only tracks activity when the employee is clocked in. No spying, only transparency.
Polonious is an ISO27001 certified secure, extremely flexible and highly configurable investigation workflow solution. Icon
The system includes features such as process centrism, workload management, reporting, dynamic dashboards, case reports, integrations and more. With our process and compliance focus, you can ensure your investigations are fully compliant with applicable regulations, with minimal extra effort or stress.
Kochava Marketers Operating System Icon
Kochava Marketers Operating System

Empowering Marketers and Publishers

We deliver better insights and actionable data in one operational platform.
ConnectPointz EDI Software Icon
ConnectPointz EDI Software

ConnectPointz connects and automates business systems and processes through pre-configured and custom integration solutions.

We understand that every client has unique requirements for their supply chain, warehouse management, and sales channel partnerships. We make our services flexible to meet any need and integrate with the leading business applications and any sales channel. As a result, your business will have fewer data entry tasks, human errors, larger margins, and higher efficiency. ConnectPointz offers pre-configured and custom commerce integration solutions that will streamline your business processes, regardless of your size and business model. We improve supplier and retailer communications by removing the need for manual, recurring data entry tasks, reducing costly human data entry errors and delays, and cutting down on your labor costs.
DriveStrike: Remote Wipe | Data Breach Protection Icon
DriveStrike: Remote Wipe | Data Breach Protection

. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.

Additional Details for WritRecogn

Languages

English, Chinese (Traditional), Chinese (Simplified)

Intended Audience

End Users/Desktop

User Interface

Gnome, KDE, GTK+

Programming Language

C

Registered

2008-01-21

Last Updated

Categories

Internationalization (I18N), HMI

Maintainers

dingyichen

Keep Me Updated!