Welcome Guest | My Membership | Login

NATHAN RECTOR

Company: NATEC SYSTEMS Corp

Bio

 

Articles

  • From the Inside July/August 2017

    We're already planning for the next Spectrum conference. If you haven't yet seen the information for the 2018 Spectrum, it will be April 23rd-26th at The Henderson in Destin, Florida. This is a new venue for the conference.

    Read More...

  • MultiValue Database and Framework Benchmarking

    Benchmarking has been a topic that's been around for several years, but nothing really has been provided to the MultiValue Community to use. I've heard many different reasons for the lack of benchmarking, so I'll go through a few of them.

    Read More...

  • Building a Modern Line-Of-Business Application: Part 6 - Version Defense Strategy

    This article series is exploring what it takes to build a Line-Of-Business application from scratch using the tools and features found in modern software technologies. Part 6 discusses defense strategy.

    Read More...

  • From the Inside: September/October 2016

    I've been talking to a lot of people about hiring Millennial developers again. It goes back to the whole "The Millennials are Coming" and "How to Keep Them" questions that we talked about at the 2016 Conference.

    Read More...

  • IS.HASH.SHA1: Generating SHA1 Values with Generic MultiValue BASIC

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 hash because it has a more secure hash value. While not as secure as SHA256, it is still used in many places for data integrity, version control, and other features that need unique one-way signatures.

    Read More...

  • IS.HASH.SHA1: Generating SHA1 values with Generic MultiValue BASIC

    In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 ash a more secure hash value. While not as secure as SHA256, it is still used in many places for data integrity, version control, and other features that need an unique one-way signatures.

    Read More...

  • OAUTH 2 Login with MultiValue BASIC — Part 3

    Consuming web services like Avalara Saletax within your MultiValue applications is easy, but many web services are starting to require OAUTH 2 login authentication. OAUTH 2 adds an additional complexity to working with web services, but the complexity is much simpler than the documentation makes it look. This the final article on using OAUTH 2 and provides all the code needed to access OAUTH 2 web services.

    Read More...

  • OAUTH 2 Login with MultiValue BASIC Part 2

    Consuming some web services within your MultiValue applications can be easy, but many web services are starting to require OAUTH 2 Login authentication. OAUTH 2 adds an additional complexity but, with a few explanations, it becomes much simpler than the documentation makes it look. This article will talk about what is required to create an OAUTH 2 Login process within your MultiValue application.

    Read More...

  • From the Inside September/October 2015

    How do you build a new business application using all the current technologies and design patterns? I've been thinking about this for a while now. So, I've decided to take on the task of reinventing the wheel.

    Read More...

  • From the Inside January/February 2015

    We've covered this in the past, but not recently. It's been a while since I've even given it much thought, or discussed it here. It's something many businesses use unconsciously when evaluating new software or changing their existing business software: The Business Application Paradigm.

    Read More...

|<  <   1 | 2 | 3  >  >|  

Return to top