david 5m got their new logo design by running a design contest:
New logo wanted for KidTrack
Check out david 5m's Logo design contest…
Safer Cell Phone Usage
Kidtrack is loaded on to an Android cell phone and then tracks activity on that phone and send emails about the activity to an email address that is specified when the application is registered with the system. The rest is from our website: KidTrack is the preeminent software on the market today for allowing parents to monitor their children’s cell phone usage. Once installed on a cell phone it monitors: - text messages - incoming and outgoing phone log - each web site visited - location - media (pictures, audio and video) It silently captures the information (even if it is deleted by the child) and periodically uploads it to the KidTrack servers where it can be viewed by the parent via a web browser. Additionally the information is sent via email on a regular basis as selected by the parent (initially daily). KidTrack solves the problem of allowing parents to monitor their children and keep them safe. It has a number of options that allow it to be customized for each family’s needs with good, smart defaults that allow it to be setup easily with a minimum of fuss. KidTrack has been written from the ground up by parents for parents. Recognizing how important the information is to parents we designed KidTrack in such a way as to not rely on carrier connectivity. This guarantees that we can capture the information even when the phone cannot connect to the carrier network or when there is limited connectivity. Many of our competitors lose important information because they rely on always being able to send information via the carrier network and throw it away when they are unable to send the information. We consider this to be unacceptable and it also increases your cost of running their software as each individual piece of information is sent as needed, while we bundle information together and will send multiple text messages, location readings, phone log entries, etc. at the same time. Other competitors rely on the information being present within the phone and are susceptible to your child deleting the information before it is sent to you. It is precisely the text messages or the phone call in the phone log that your child deleted that is of most interest to you. We consider this to be unacceptable as well. For more detailed information visit the How it Works page If you would like to subscribe to KidTrack service, please visit the Sign Up! page
Logo types to explore
Check our website. rushsoftware.com for an explanation of the product. You may also see the description in Google Play for KidTrack
US$299 Bronze package
Every design category has flexible pricing for all budgets. Logo design starts at $399.
Full copyright with production-ready files for digital and/or print.
It all began with a design brief.
A quick, interactive guide helped them understand their design style and captured exactly what they needed in their logo design.
Designers across the globe delivered design magic.
david 5m collaborated with designers to refine their ideas
When design entries come in, you can rate them so designers know what you’re looking for in your logo design.
99designs has great collaboration tools so you can pinpoint and capture your ideas
And then… they selected a winner!
Along the way, they met lots of talented designers…
We think contests are a super fun way to get design.
Recently completed contests:
Rixon Technology offers a data tokenization service to companies of all sizes. We specialize in complex information secu
We sell fire and waterproof products to protect money, passports, and legal documents to business professionals and priv
Electronic Bug Sweeping Audience: Anyone who feels they are being tracked by video or audio equipment (eg hidden camer
We manufacture new and innovative firearms. Our target audience is adults from the United States that are interested in
Army Infantry Company that deploys around the world.
This is a government contracting company that specializes in information technology and cybersecurity.
The Common Vulnerabilities and Exposures (CVE) Program was created 20 years ago and is the de facto international standa