I believe for the visibility of data for all network users in a Windows server system, cmxSys( 1002, .f. ) is sufficient. In a centralized server scenario, a cache that sits between the hard drive and the application would indeed apply to all users accessing the server. When a ...
... the original passwords. For now, I have to manually copy the encrypted value and the IV into the database. For internal use, this is entirely sufficient. Perhaps someone is interested and we could further develop this project. Encrypt original key with master password Please enter your master ...
... I made some changes to fwdbg.PRG ( I can send to Antonio ) for the compilation I use hbmk2 and it is sufficient to put it in the .hbm file fwdbg.PRG Maurizio http://www.nipeservice.com
... requests: https://github.com/webview/webview/issues/792#issuecomment-1172852232 While your approach may work, I suspect that it is not going to be sufficient because the user agent is sent to the server with every HTTP request, and I doubt that you can successfully intercept them all using only ...
... to peer ( which is not good when some clients have 10-20 workstations ). NO, a web based solution will NOT work for my clients. Most do not have sufficient internet capabilities to perform their daily work, so it must be a local server setup. I would like to hear of solutions others may have ...
Good morning, To determine whether a DBF file has changed, it would be good to determine the date and time of the last change. It is sufficient to determine the date and time with the dirctory() function? Is there a function that can access the timestamp in the DBF directly?
... the materials for all the chips and batteries is becoming scarce. With cloud based services, a large portion of the consumer public doesn't have sufficient access to the web to handle their needs. 2). Security / Trust: With cars, which are technology devices, people will have difficulty relying ...
... to build one, nor can I see the personal benefit for me in the future relative to my work. So I simply build the info into One Note and that is sufficient. By the way, we use the same program for our documentation, and yet I find that my clients rarely, if ever, read the manual, even when a ...
Dear Antonio, How can I compress response json in ajax call. I think this should be possible with mod harbor. But then is if sufficient to simply use content-encoding: gzip. Maybe you have an example.
... apps, surely Microsoft will have something similar in it's API library. Of course, most people will not have cameras on their Windows computers sufficient to perform facial recognition. Microsoft computers do have this, but not necessarily the other brands.
Silvio, Hmm. I am guessing the islock is a fieldname and only some records are blocked from deletion? I'm not sure this is sufficient. If ANY record is connected to any other record, then it cannot be deleted without consequences. Thus if any service is deleted and it is also on an ...
Silvio, Hmm. I am guessing the islock is a fieldname and only some records are blocked from deletion? I'm not sure this is sufficient. If ANY record is connected to any other record, then it cannot be deleted without consequences. Thus if any service is deleted and it is also on an ...
... Goverment the Italian regulation does not allow for canceled or canceled numbers: - for the customer / supplier registry, only the number is sufficient (but it must be progressive) - for articles ,there is the article code so there is no problem - for invoices, ( alsoaccounting movements, ...