Suggested Categories:

Version Control Systems
Version control software assists in the revision and management of the changes made to web sites, documents, programs and their source code.
Document Control Software
Document control software is designed to manage and track documents throughout their lifecycle, ensuring that they are properly stored, organized, and accessible. It provides features like version control, audit trails, and access permissions to maintain document integrity and security. This software helps organizations maintain compliance with industry standards and regulations by ensuring documents are updated and reviewed in a controlled manner. It also facilitates the efficient sharing and retrieval of documents, reducing the risk of errors or outdated information being used. By centralizing document management, document control software streamlines workflows and improves collaboration while minimizing risks associated with document mismanagement.
Document Version Control Software
Document version control software is designed to track and manage changes made to documents over time, ensuring that all revisions are properly recorded and organized. It allows users to store multiple versions of a document, making it easy to view, compare, and restore previous versions if needed. The software typically includes features like automated version tracking, timestamps, and user identification to provide a clear history of document edits. By managing versions efficiently, it helps prevent conflicts or errors from outdated or conflicting document versions. This type of software is essential for maintaining accuracy, transparency, and collaboration, especially in environments with frequent document updates and multiple contributors.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Inventory Control Software
Inventory control software helps businesses manage and track their inventory levels, ensuring that stock is accurately recorded and available when needed. It automates processes like stock replenishment, order management, and tracking inventory across multiple locations. The software often includes features such as real-time inventory updates, barcode scanning, and alerts for low stock levels, helping prevent overstocking or stockouts. By providing detailed insights into inventory movements, it improves accuracy, reduces manual errors, and enhances operational efficiency. Ultimately, inventory control software optimizes stock management, reduces costs, and supports better decision-making for supply chain and warehouse operations.
Parental Control Apps
Parental control apps are a type of software or app designed to help parents protect their children from malicious online content. Parental control apps offer a range of tools and filters, such as a website blocker, online time management and activity monitoring. These tools allow parents to limit their children's exposure to potentially harmful content on the internet, while also allowing them to observe their children's online behavior.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Pest Control Software
Pest control software allows pest control businesses to improve the efficiency of their operations by optimizing the management of customers, schedules, inventory and billing.
Construction Quality Control Software
Construction quality control software is software that helps contractors and project managers ensure compliance with industry standards, safety regulations, and project specifications. It streamlines inspection processes, defect tracking, and documentation management, reducing the risk of costly rework. Many platforms offer real-time reporting, photo documentation, and mobile access, enabling teams to quickly identify and resolve quality issues on-site. Integration with project management and field collaboration tools enhances communication between stakeholders and ensures accountability.
Distributed Control Systems (DCS)
A distributed control system (DCS) is a computerized control system for a process or plant, with autonomous controllers that are distributed throughout the system. It uses digital communication to coordinate these distributed controllers in order to achieve a common goal. DCS typically requires dedicated programming for configuration and more complex systems will include data historians, HMIs, and network components. They are generally used to provide higher levels of safety and efficiency in industrial applications.
Application Delivery Controllers (ADC)
Application Delivery Controllers (ADCs) are software solutions designed to optimize the performance, security, and availability of applications delivered over the internet. They manage traffic between users and applications by distributing it across multiple servers, ensuring load balancing and preventing overloads. ADCs also provide security features like SSL offloading, DDoS protection, and web application firewalls to safeguard applications from attacks. By improving application response times and ensuring high availability, ADCs enhance user experience and help maintain service continuity. They are commonly used in data centers and cloud environments to ensure efficient and secure application delivery.
Advanced Process Control (APC) Systems
Advanced Process Control (APC) systems are computer-based systems that use mathematical models and algorithms to optimize the performance of industrial processes. APC systems aim to maintain a steady state operation with tight control over process variables such as temperature, pressure, flow rate, and composition. It incorporates feedback from sensors in the process to monitor performance and take corrective action when needed, in order to keep the process operating in the desired range. APC systems can help improve efficiency, reduce energy usage, increase throughput, and reduce product variability.
Model Predictive Control (MPC) Software
Model Predictive Control (MPC) software is a type of advanced process control algorithm used to optimize process performance. It uses mathematical models and predictive algorithms to anticipate future conditions and automate how a system should respond. MPC is often used in industrial settings to adjust variables in real time, such as temperature, pressure, and flow rate. It enables manufacturers to maintain desired process operations with greater efficiency than traditional methods.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Session Border Controllers (SBC)
Session Border Controllers (SBCs) are network devices or software solutions that manage and secure real-time communication sessions, such as Voice over IP (VoIP) calls, video conferencing, and other multimedia exchanges, particularly between different networks. SBCs are deployed at the borders of networks, typically between an enterprise and a service provider network, to protect the communication infrastructure and optimize traffic flow. Their primary functions include session signaling, traffic routing, encryption, and ensuring secure interconnection between different communication systems. SBCs handle tasks like ensuring high-quality service (QoS), mitigating security threats (such as denial-of-service (DoS) attacks and eavesdropping), and maintaining compliance with industry standards.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
SPC Software
Statistical process control (SPC) software allows manufacturing companies to streamline the management, comparison and analysis of statistical data in order to optimize performance and make predictions.
Change Management Software
Change management software is a tool used to coordinate changes and improve the effectiveness of varying processes. It enables organizations to track and manage change requests, assess impact, approve or reject change proposals, assign tasks to relevant personnel, and monitor progress until completion. Change management software also allows users to document all changes for audit and compliance purposes. Additionally, it provides notifications and automated workflows which simplify the process of adapting to organizational change. Finally, the software can enable collaboration between team members by providing them with access to data stored in one central repository.
Source Code Management Software
Source code management (SCM) software is a type of software to help developers track, manage, and version control their source code throughout the software development lifecycle. These tools allow multiple developers to collaborate on the same project by maintaining a centralized repository where code changes are stored and tracked. SCM software typically includes features like version control, branching, merging, and conflict resolution to ensure that code changes are properly managed and integrated. It also provides tools for tracking issues, auditing changes, and ensuring that all team members are working with the latest codebase. SCM software is essential for maintaining code integrity, improving collaboration, and enhancing productivity in development teams.
View more categories (20) for "telescope control"

22 Products for "telescope control" with 2 filters applied:

  • 1
    BluVault

    BluVault

    Parablu

    ...Data secured by BluVault is encrypted with modules that meet the most stringent regulatory requirements, including GDPR. What’s more, YOU (the organization), retains control over the encryption keys and have complete flexibility and control over how and where your data is secured. Apart from protecting and safeguarding data from loss, misuse, and unauthorized alteration, BluVault is built to deliver complete control over the data protection process with detailed reporting, alerting and audit logs.
  • 2
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
    Leader badge
    View Software
    Visit Website
  • 3
    baramundi Management Suite

    baramundi Management Suite

    baramundi Software USA

    ...Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more.
    Starting Price: $5000.00/one-time
  • 4
    ElephantDrive

    ElephantDrive

    ElephantDrive

    ...ElephantDrive features the Everywhere Folder that enables users to store data and sync it to all of their other devices. ElephantDrive enables users to revert back to an older version of a stored file with the Versioning Control feature. ElephantDrive also features the Archive Control to recover deleted files.
    Starting Price: $10 per month
  • 5
    SnapShooter

    SnapShooter

    SnapShooter

    ...SnapShooter’s advanced retention policies allow you to keep as many daily, weekly or monthly backups as needed. Only pay for what you store. With SnapShooter, you are in ultimate control of your data. You decide where and how your data is stored, regardless of where in the world you are. If something does go wrong, SnapShooter backups and snapshots are easy to restore. You will be up and running quickly.
    Starting Price: $10 per user per month
  • 6
    Quest Recovery Manager
    ...Integrated malware detection and removal capabilities, utilizing Microsoft's Defender, help eliminate the risk of reinfection during the recovery process. Recovery Manager supports automated phased recovery, allowing for the quick restoration of critical domain controllers to resume essential business functions, followed by the redeployment of remaining controllers.
  • 7
    Probax

    Probax

    Probax

    Probax is an award-winning provider of data protection solutions and services including data backup and retention, disaster recovery and business continuity. With unmatched partner enablement and support, together with continued innovation and integration with leading technology vendors including Veeam, StorageCraft, Dropbox and Microsoft; Probax empowers businesses to protect their most asset, their data.
    Starting Price: US $0 /month
  • 8
    Solink

    Solink

    Solink

    Solink is a cloud video security and analytics platform that works with your existing cameras, access controls, and operational technologies like POS and labor management, helping you modernize and improve security and operations without costly upgrades. Solink is already trusted by 30,000 customers across 32 countries.
    Starting Price: $175/location/month
  • 9
    Canadian Cloud Backup

    Canadian Cloud Backup

    Canadian Cloud Backup

    Take control and easily brand our White-Label software with your company’s logo, name, and information. Sell to end-users with confidence and increase your earning potential with recurring revenue. Canadian Cloud Backup’s primary data center is compliant with PCI DCC, PIPEDA, and HIPAA. We are currently in the process of obtaining additional certifications such as SSAE16.
  • 10
    Spare Backup

    Spare Backup

    Spare Backup

    ...The mobility of Cloud-based solutions makes it possible for your ibackup solution to develop as your company’s professional cbt venture develops. Decreased Expense of Control: With no important on-location devices, vital cutbacks in utility expenses, and a solution fit perfectly for your venture. Cloud data backup alternatives are best for large and modest businesses like a certified public accountant company where you not simply pay for specifically what you need but additional reduce costs somewhere else.
  • 11
    Stellar Data Recovery Technician

    Stellar Data Recovery Technician

    Stellar Data Recovery Inc.

    ...It rebuilds virtual RAID in case of incorrect or unknown RAID parameters and efficiently performs ‘RAW Recovery’ or ‘Search Lost Volume’ operations to recover data from a supported RAID array. The software rebuilds broken or corrupt RAID and recovers the data without a hardware RAID controller or any third-party tool. Stellar Data Recovery Technician supports data recovery from BitLocker-encrypted storage devices such as HDD and SSD, including 4K drives, USB thumb drive, and more. It supports recovery from crashed or unbootable systems by creating a bootable USB recovery media. The software creates a disk image of the hard drive to facilitate safe and fast recovery from the fragmented disk drive.
    Starting Price: $199 per year
  • 12
    Radia

    Radia

    Accelerite

    ...Obtain the latest compliance standards from respective governing authorities. Perform regular scans to monitor vulnerability, compliance issues and deviations. Gain real time visibility and control through the readily available analytics report that’s aids in timely decision making. Better information governance and compliance through unified reporting, management of latest software and OS patches, accurate configurations and full adherence with corporate policies. Patches all platforms and multiple 3rd party apps, and patch configuration compliance in hours not days.
  • 13
    CYA SmartRecovery
    Documentum® allows you to deploy robust, agile business applications that manage, control and automate critical business processes across various departments. However, the amount of information stored in your Documentum repository grows continuously and its not uncommon to have repositories in the terabyte size range - with petabyte-sized repositories just around the corner! Without the right solution, protecting this critical data from all potential threats can be a Herculean task. ...
  • 14
    Storegate

    Storegate

    Storegate

    Take control over your files. Storegate makes it easy and secure for you and your company to store and share files. We protect your privacy and store all information in Sweden, under Swedish law. With Storegate Solo you can store, access and share information anywhere, anytime. The service has features for secure file sharing with BankID and more.
  • 15
    AlmerBackup Pro
    ...Main difference is possibility to run AlmerBackup Pro as a service in WinNT, Win2000, WinXP and Win2003. As a result, AlmerBackup Pro will do reserve copies of your data automatically, without your manual control. AlmerBackup Pro is a reliable backup solution specially created for advanced users who want to have more options and very highly regarded by the IT professionals. In fact, some system administrators tried over a dozen of backup utilities before, only to find that they were either completely incompatible with their network settings or did not provide enough automation and customization options. ...
    Starting Price: $25.00
  • 16
    DBF Doctor

    DBF Doctor

    Astersoft

    ...The automated recovery process, powered by a unique artificial intelligence, restores and repairs your damaged files as accurately as possible. Or, you keep complete control by working manually with the damaged data in the file. No backup files? No problem. DBF recovery has never been so easy. DBF Doctor automatically recognizes all popular formats: Dbase III/IV, FoxPro, Visual FoxPro, and more! Are you an IT professional, system administrator, or database user? Get DBF Doctor to complete your IT toolset. ...
    Starting Price: $115.00
  • 17
    Uranium Backup

    Uranium Backup

    Nanosystems

    The intuitive interface allows configuring a backup set in a few seconds. Data are always under control, as the reporting system will alert in case of malfunction. This saves your time and ensures security. The support team provides a fast, skilled and free technical support to all subscribers of a license. You can access Support by phone or e-mail. Uranium Backup performs backup of files and folders, disk images (Drive Image), Exchange mailboxes, databases, and virtual machines on multiple storage such as hard disks, NAS, tapes, FTP servers and Cloud destinations. ...
    Starting Price: $95.00/one-time
  • 18
    RS Partition Recovery

    RS Partition Recovery

    RecoverySoftware

    ...Complex deep analysis algorithms enable signature-based recovery of hundreds of file formats, while quick scan recovery returns the list of recoverable files and folders in a matter of seconds. Need to recover data from a corrupted RAID array? No access to necessary files after a disk array or NAS server failure? Failed RAID controller? Disk errors do not allow full work with the storage? RS RAID Retrieve helps repairing a wide range of RAID arrays by connecting the disks directly to your computer and recovering data! Running in Windows, RS RAID Retrieve will detect disk arrays created in Windows, Linux, macOS, and Unix on any NTFS, ReFS, FAT, exFAT, APFS, HFS+, Ext4, XFS, ReiserFS, Ufs, Btrfs or Zfs file systems. ...
  • 19
    TweakBit File Recovery
    ...You can customize your scan for deleted files, preview items from the search results, and recover only the files you really need. Power to surprise you, intelligent control. Your deleted files are not really deleted. An effective tool for files you may lose by accident or to a virus attack. At TweakBit, we are dedicated to creating high-quality software that lets you recover files lost due to an accident or a malware attack. Our team is composed of software and web developers, QA specialists, and technical support staff, all skilled professionals with years of experience.
    Starting Price: Free
  • 20
    Backblaze

    Backblaze

    Backblaze

    ...Listen to a song. Backblaze ties into the power of your iPhone & iPad or Android device to open almost any downloaded file with the app of your choice. You are in control. Your files are organized just as they are on your computer. Download any of them (up to 5GB in size). You'll be able to see and/or hear all the file types your device knows how to present. Backblaze is a great way to backup all your files to the cloud. It's automatic. It's easy. And your computer will thank you.
    Starting Price: $6.00 per month
  • 21
    Unitrends Backup
    ...Integrations with remote management, security and IT documentation tools provide end-to-end protection from human error, cyberthreats and inject automation and artificial intelligence to simplify complex systems. Managed through a singular portal, Unitrends offers a unified experience with visibility and control across a complete backup infrastructure.
  • 22
    KeepItSafe

    KeepItSafe

    KeepItSafe

    ...An all-in-one disaster recovery and online backup solution — offering fully managed and monitored DRaaS that replicates and protects data across multiple off-site secure servers, and provides failover in the event of any emergent event. Powerful endpoint backup, file sharing, collaboration, and data-loss prevention in one unified solution. KeepItSafe Mobile provides IT managers with the control they need to protect their enterprise against unforeseen data catastrophe.
  • Previous
  • You're on page 1
  • Next