Welcome Guest | My Membership | Login

Featured Resource

  • Business Tech: AI and DSS: Part II

    SQL is designed for a specific type of optimization. MultiValue is designed for thingedness. Charles explains this odd term and gives some insight into the cultural differences between these two approaches.

    Read More...

Most Recent

  • Specialization Versus Agile Development or, How to create high-performance teams, and love the generalists that can save your tail

    Once a shop has more than one programmer, the question of how to approach projects takes on a deeper dimension. As a solo artist, you have all the work, but also all the flexibility. Teams need at least a minimal structure. Agile has been touted as one of the best. Here's the counter-argument.

    Read More...

  • Building a Modern Line-Of-Business Application - Part 3

    Key Management The key to keys is the key to success. Creating record keys on-the-fly is common in software development, but a little planning can go a long way. This is part three of our article series exploring what it takes to build a Line-Of-Business application from scratch, using the tools and features found in modern software technologies.

    Read More...

  • Business Tech: Parametrics

    any of us are drowning in a sea of hundreds of programs. Parametrics allow us to severely reduce the total while still serving the same needs. If you believe that "code is a mortgage on your soul" read on.

    Read More...

  • IS.HASH.HMACSHA1: Generating HMAC-SHA1 Values with Generic MultiValue BASIC

    The Message Authentication Code (MAC) is a widely used technique for performing message authentication. HMAC (short for "keyed-Hashing for Message Authentication"), a variation on the MAC algorithm, has emerged as an Internet standard for a variety of applications.

    Read More...

  • IS.HASH.SHA1: Generating SHA1 values with Generic MultiValue BASIC

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 ash a more secure hash value. While not as secure as SHA256, it is still used in many places for data integrity, version control, and other features that need an unique one-way signatures.

    Read More...

|<  <   1 | 2 | 3 | 4 | 5 | 6 | 7  >  >|  

Return to top