Ace Contact Manager enables you to schedule events for any contact record or group of contacts. As events occur you can finish them to the History data base where completed events are permanently stored. Your can print histories with the Report function. Illustrated below are the Main Contact Screen and History database information.
Contact management software, especially Ace Contact Manager, fills a vital role in the successful management of any business. Ace, as any good contact manager, allows people in an organization to access and collect data about any entity or person which comes into contact with the organization. Ace Contact Manager provides a fully indexed, grouped, and coded company wide master address book, sometimes called a personal information manager (pim), listing all contacts with all collected information necessary for the running of a business or organization. Ace gives the individual the tools for appointment, time, task and contact tracking and management while centralizing and providing security for the data for the benefit of the organization. If you’re new to contact managers, click here to learn why no business should be without one.
- Ace is easy to install, administer, and grow. One big difference with Ace Contact Manager is that Ace is easy to install, administer, and grow. Although Ace is at home on a stand-alone computer or in a peer-to-peer setup, it’s designed to provide maximum utility and security on a Local Area Network (LAN). But, unlike other network-based contact managers, it doesn’t take a LAN administrator to install Ace. Anyone who has ever installed a software program will find installing Ace on a network fast, simple and easy.
- Ace is easy to administer. Unlike some other contact managers, Ace does not have to be installed on every user workstation. Prior to Windows Vista, Ace is installed on the LAN server and only icon links need be installed on individual workstations. In Windows Vista Ace is also installed on each workstation but accesses LAN files. This is the Windows Vista paradigm. Whether on a stand-alone computer, a peer-to-peer setup or a 100 user LAN, Ace can easily be administered by anyone who is generally familiar with software. No special skills or training are necessary; if you can use a word processor and send E-mail, you can administer Ace.
- Ace provides greater security. Ace can be configured to prevent anyone other than authorized administrators from saving records, documents and files to unspecified hard drives, floppy drives or other storage devices. Any attachments, regardless of type, are copied into a subfolder which is a part of the contact database. On a workstation these attachments are viewed by the local workstation default viewer whenever the attachment title is clicked. When a document in this folder is modified by a user, a new document is created. Also, if a user references a document somewhere else on your network which is already stored in the ACE attachment database, the attachment process now points to the copy already in the ACE database. You have all versions of a document. An attachment reference always points to the exact document which was referenced (not an updated version of the reference). Once Ace is installed and configured, your valuable data which Ace references is stored exclusively in a folder on the installation server. You can then restrict read from and write to access for that folder to just the Ace users or as you wish.