Welcome Guest | My Membership | Login

Featured Resource

  • Augmented Reality in Business

    Many technological advancements have created new ways of doing business. Some are obvious, like the impact of the spreadsheet or the word processor. With Augmented Reality (AR), the business case is less clear. This article will talk about how Augmented Reality will be used in business and some of what sort of software changes you can expect.

    Read More...

Most Recent

  • IS.HASH.SHA1: Generating SHA1 values with Generic MultiValue BASIC

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 ash a more secure hash value. While not as secure as SHA256, it is still used in many places for data integrity, version control, and other features that need an unique one-way signatures.

    Read More...

  • IS.HASH.SHA1: Generating with UniBASIC DIGEST command

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United State NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 a more secure hash value. While not as secure as SHA256, it is still used many places for data integrity, version control, and other features that need an unique one-way signatures.

    Read More...

  • XMV: CALLER and GET.CMD

    CALLER is a TCL command which calls a subroutine. It is useful for testing. GET.CMD is a subroutine command which gets all of the command line values used.

    Read More...

  • From the Inside May/June 2016

    What is the Most Valuable Asset in your company?

    Read More...

  • From the Inside March/April 2016

    Over the last ten years, new interface technologies have emerged, but LOB (Line of Business) and ERP (Enterprise Resource Planning) applications are not taking advantage of them. This is causing LOB and ERP to become very cumbersome and blocky. I'm not just talking about MultiValue applications; this is across the industry.

    Read More...

|<  <   1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  >  >|  

Return to top