Mar/Apr 2011

From the Inside Mar/Apr 2011

Welcome to the International Spectrum 2011 Conference!

Read More...

Character Encodings

It's a small world and getting smaller, especially thanks to the Internet and web-enabled applications. Whether due to a business expanding into international markets or acquisitions by, or partnering with, foreign companies, many applications are finding a need to be multilingual, not just MultiValue. So how do you represent the different non-English characters?

Read More...

Business Tech: User Ownership of Data

Gone are the days when the Data Processing department was both keeper and defender of the data and parceled it out to users on green bar reports where they could look but not touch. Today's users insist that data be presented to them in such a manner that they can manipulate it, summarize it, use it, and even lose it. This provides the modern IT department with a new set of challenges.

Read More...

Sending E-mail from Your MultiValue Programs - Part 2 - Using IIS

Part 1 of this series of articles showed you how to construct an e-mail, including the necessary items in the header and body. So now you have it, what do you do with it? There are a variety of ways to actually send e-mail. We start by introducing you to SMTP using Microsoft's Internet Information Server.

Read More...

MultiValue and QuickBooks, Part 2: Exporting to MultiValue

Many MultiValue accounting packages lack the GUI interface modern users demand or other features that are considered to be mandatory by anyone who has used a modern accounting application. One option is to replace it with an off-the-shelf commodity accounting package and share data between it and the MultiValue system running the core business functions. Part 1 dealt with getting data from MultiValue to QB. Now we go in the other direction.

Read More...

First Steps to Securing Your Information in the Internet Age

While computer and data security is a large and complex subject, it is disconcerting how many MultiValue systems do not even take the most fundamental precautions to protect user data from unauthorized access. Just a couple of straightforward techniques can prevent that kid on the coffee shop WiFi from stealing your access codes and walking through your system at will.

Read More...

User Interface Design: Defacto Standards and Unicorns

The green screen may be dead, but graphical user interfaces bring with them their own set of issues. Because of their flexibility, a set of GUIbased programs in an application written by different programmers, each with their own opinion and style, can be even more difficult to understand, use, and navigate than the old green screens. But do user interface standards appear magically?

Read More...

Clif Notes: They're Everywhere! (Well, Not Quite Yet)

I see QR codes. But unlike the ghosts of dead people, these things are present in our external reality. And I'm not alone. Lots of people see them, including the attendees at the 2011 International Spectrum conference. You see them too. Look up at the top of this page. See that square checkerboard thing? That's a QR code.

Read More...

Clif Notes: Ever Feel Like Just a Cog In The System?

A while back, our Content Editor, Shannon Stoltz, introduced me to a book by Rajesh Setty titled Beyond Code: Learn To Distinguish Yourself In 9 Simple Steps. It is targeted at the IT professional who wants to break out of the rut of constantly rushing to acquire another skill (programming in Python, for example) only to find out they have become what he calls a "commodity"— just another Python programmer easily replaced with any other Python programmer (at least in the perception of upper management).

Read More...

Downloads:

menu
menu