Necromancers Software Collection
SITE NAVIGATION:




eXTReMe Tracker

  VeraLab 2.1  Click this icon to download
VeraLab 2.1  or just click on the name of the file

Screenshot of VeraLab


Computer Lab Management System. Increase efficiency, security, and cost-effectiveness of your computer labs. Turn your lab into a production line. Automate major processes in the computer laboratory. A facility equipped with VeraLab will enjoy the following: Secure environment. Users are discouraged from unlawful activities. ?heck-in and locking prevents unauthorized access. Registration logs help identify abusers. Alert lists inform personnel of known abusers. List of running applications and screenshots can be captured. Increased availability of workstations. Equipment problems can be tracked and collaborated upon to ensure prompt resolution. Out-of-order stations can be marked unavailable for check-in. Optimized occupancy. Fewer workstations are needed to process higher traffic. Lab assistants can view room occupancy in the entire lab and redirect users to less-occupied rooms. Better resource planning. Usage statistics help reveal shortages of equipment and estimate needed quantities. Cost of maintenance and downtime data help avoid buying from low quality vendors. Lower software expenses through software metering. A limited number of users can use certain software simultaneously. Thus, you can buy fewer licenses and still install software on every workstation. High degree of control. Managers can view the current status from anywhere via the Internet. Stricter employee attendance is encouraged by requiring employees to check in when starting and ending shifts. Streamlined processes. Lab assistants do not need to communicate with technicians in person. Reporting capabilities. Attendance data can be collected and presented for payroll processing. Analytical data can be pulled into reports. Better lab scheduling. If there is a need to limit the lab's open hours, the system will pinpoint lower traffic periods. Immunity from accusations of negligence. In case of hacker activity the system provides all necessary means to identify abusers.


Version:  2.1
Release Date:  06/27/2004
Size:  5000  KB
Platform:  Windows2000,WinXP

Program type:  Commercial
Online order: purchase
Review: Click here

Requirements:  MySQL 4.0, JRE 1.4.2, Tomcat 4.1

Developer: Suricatta, Inc.
Download program



SEE ALSO:
© 2000-2024 Media Programming Group
urry@necromancers.ru