Welcome Guest | My Membership | Login

Nathan Rector

Company: International Spectrum


Nathan Rector, President of International Spectrum, has been in the MultiValue marketplace as a consultant, author, and presenter since 1992. As a consultant, Nathan specialized in integrating MultiValue applications with other devices and non-MultiValue data, structures, and applications into existing MultiValue databases. During that time, Nathan worked with PDA, Mobile Device, Handheld scanners, POS, and other manufacturing and distribution interfaces.

In 2006, Nathan purchased International Spectrum Magazine and Conference and has been working with the MultiValue Community to expand its reach into current technologies and markets. During this time he has been providing mentorship training to people converting Console Applications (Green Screen/Text Driven) to GUI (Graphical User Interfaces), Mobile, and Web. He has also been working with new developers to the MultiValue Marketplace to train them in how MultiValue works and acts, as well as how it differs from the traditional Relational Database Model (SQL).


Conference Sessions

Integrating Office365 Web Service with MultiValue BASIC Routines 5/1/2017 3:30:00 PM
Integrating MultiValue data with Office Addins (Excel/Outlook) 5/3/2017 9:00:00 AM
Disaster Recovery Planning 5/4/2017 9:00:00 AM
Integrating SalesForce with your MultiValue Application 5/4/2017 10:00:00 AM



  • From the Inside January/February 2017

    Let's say you are a rock star or a professional athlete. You have talent. More than that, you are a master of your craft. Performing — onstage or on the playing field — is the practical demonstration of what you can do. Despite the hours you spend playing in public, you are still required to practice, practice, practice in private.


  • Augmented Reality in Business

    Many technological advancements have created new ways of doing business. Some are obvious, like the impact of the spreadsheet or the word processor. With Augmented Reality (AR), the business case is less clear. This article will talk about how Augmented Reality will be used in business and some of what sort of software changes you can expect.


  • IS.HASH.MD5 Generating MD5 Values with Generic MultiValue BASIC

    The MD5 message-digest algorithm is a widely used cryptographic hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32-digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications and is also commonly used to verify data integrity.


  • From the Inside November/December 2016

    Changes are a-coming, if you have not already seen them. Because businesses are increasing IT spending for automation projects your work load and requirements are increasing.


  • IS.UUID.V1 UUID V1 Time Based Generation

    A Universally Unique Identifier (UUID) is an identifier standard used in many non-MultiValue databases and software to generate a Unique Id outside of using incremental numbers. A UUID is simply a 128-bit unique value that can be expressed as either a larger number, or a string.


  • Building A Modern Line-Of-Business Application Part 4: Identity Management

    This is part 4 in a series on exploring what it takes to build a Line-Of-Business application from scratch using the tools and features found in modern software technologies. In this article we explore identity management. What does it take to provide provide security, access management, and business discipline to the users of your software? Read Part 4 and find out.


  • From the Inside July/August 2016

    It is the time of year that I start planning for the next Spectrum conference. If you haven't yet seen the ad for the 2017 Spectrum, it will be May 1st-4th at The Wigwam in Litchfield Park, (Phoenix), Arizona. This is the same venue as the 2016 conference.


  • From the Inside May/June 2016

    What is the Most Valuable Asset in your company?


  • Building a Modern Line-Of-Business Application - Part 3

    Key Management The key to keys is the key to success. Creating record keys on-the-fly is common in software development, but a little planning can go a long way. This is part three of our article series exploring what it takes to build a Line-Of-Business application from scratch, using the tools and features found in modern software technologies.


  • IS.HASH.SHA1: Generating with UniBASIC DIGEST command

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United State NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 a more secure hash value. While not as secure as SHA256, it is still used many places for data integrity, version control, and other features that need an unique one-way signatures.


|<  <   1 | 2 | 3 | 4 | 5 | 6 | 7  >  >|  

Return to top