|
|
|
|
|
|
|
|
|
|
|
|
|
|
| No matter how dexterous a development team may be, the end user of an application will always want to perform an action that is not intended...... |
|
|
|
|
|
|
|
| A "beacon" is a hardware transmitter that can "dialog" on a small perimeter with smartphones or tablets via a Bluetooth connection...... |
|
|
|
|
|
|
|
| Re-allows the access (which means the connection) to one or more databases accessible via a connection.... |
|
|
|
|
|
|
|
| Exits from the current edit. The entry in edit was performed by DocGoIntoEdit.... |
|
|
|
|
|
|
|
| The code editor proposes several display options...... |
|
|
|
|
|
|
|
| When an element is checked back into the repository, it becomes available to all the users of the Source Code Manager...... |
|
|
|
|
|
|
|
| List of constants used by the functions for managing faxes.... |
|
|
|
|
|
|
|
| WLanguage procedure ("Callback") used by zipExtractDirectory to manage the progress of files being extracted from the archive. |
|
|
|
|
|
|
|
| The visual aspect of a window control can be automatically modified according to a series of conditions in order to attract the attention of the user to this control...... |
|
|
|
|
|
|
|
| It is possible to manage and grant certain access rights to the developers for each element in the SCM...... |
|
|
|
|
|
|
|
| An application is often intended to be used by several users connected via a network...... |
|
|
|
|
|
|
|
| The setup wizard allows you to include additional modules in the setup. The additional modules are used to add additional options to the setup program and to access the advanced setup parameters.... |
|
|
|
|
|
|
|
| WEBDEV proposes the following events:... |
|
|
|
|
|
|
|
| The following WLanguage functions are used to handle UPnP devices... |
|
|
|
|
|
|
|
| The "Debugger" pane displays the debugger options when debugging the project or a project element ("Debugger" option)...... |
|
|
|
|
|
|
|
| Hashing is used to summarize a file or a character string...... |
|
|
|
|
|
|
|
| List of constants used by the Hash functions.... |
|
|
|
|
|
|
|
| The Hasp constants are as follows...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|