Welcome Guest | My Membership | Login

Featured Resource

  • Business Tech: AI and DSS: Part II

    SQL is designed for a specific type of optimization. MultiValue is designed for thingedness. Charles explains this odd term and gives some insight into the cultural differences between these two approaches.

    Read More...

Most Recent

  • IS.HASH.SHA1: Generating with UniBASIC DIGEST command

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United State NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 a more secure hash value. While not as secure as SHA256, it is still used many places for data integrity, version control, and other features that need an unique one-way signatures.

    Read More...

  • XMV: CALLER and GET.CMD

    CALLER is a TCL command which calls a subroutine. It is useful for testing. GET.CMD is a subroutine command which gets all of the command line values used.

    Read More...

  • From the Inside May/June 2016

    What is the Most Valuable Asset in your company?

    Read More...

|<  <   1 | 2 | 3 | 4 | 5 | 6 | 7  >  >|  

Return to top