|
|
|
|
|
|
|
|
|
|
|
|
|
|
| By default, TimeLine controls contain a context menu.... |
|
|
|
|
|
|
|
| This type of Native Connector allows access to ACCESS databases for better interoperability purposes...... |
|
|
|
|
|
|
|
| Runs the closing WLanguage event of an office control and displays its confirmation dialog if necessary. |
|
|
|
|
|
|
|
| Writes a message intended to another socket.... |
|
|
|
|
|
|
|
| WEBDEV gives you the ability to import a CSS style sheet into a WEBDEV project...... |
|
|
|
|
|
|
|
| By merging repositories, you can combine projects from several repositories into a single repository...... |
|
|
|
|
|
|
|
| The spreadsheet is one of the most often used business tools. You have the ability to create reports that print the data found in a spreadsheet.... |
|
|
|
|
|
|
|
| Reads the header of the email found after the current email according to the protocol used (POP3 or IMAP, Lotus Notes or Outlook). |
|
|
|
|
|
|
|
| The Description of ParallelTask type is used to define the characteristics of a parallel task. |
|
|
|
|
|
|
|
| In a CDM (Conceptual Data Model), the associations are used to link the entities between themselves...... |
|
|
|
|
|
|
|
| Creates a WEBDEV account on a WEBDEV Application Server. |
|
|
|
|
|
|
|
| The Encryption property allows you to manage the type of encryption used between Client computers and an HFSQL server. |
|
|
|
|
|
|
|
| In a Windows application, the information relative to a window is stored with the window...... |
|
|
|
|
|
|
|
| The automatic assisted replication is used to easily implement a replication on an existing application...... |
|
|
|
|
|
|
|
| Data masking is a process that transforms the data in an item that will be displayed to the user...... |
|
|
|
|
|
|
|
| A new GDPR audit is available to easily identify and monitor personal data in a WINDEV, WEBDEV or WINDEV Mobile application...... |
|
|
|
|
|
|
|
| Apple's In-House deployment allows you to overcome most of the constraints of the other two modes (App Store deployment and Ad Hoc deployment) and to widely distribute an application without the need to reference client devices in advance...... |
|
|
|
|
|
|
|
| List of constants used by the functions for managing cursors and the mouse... |
|
|
|
|
|
|
|
| Calculates the Hash of a character string according to a specific algorithm. |
|
|
|
|
|
|
|
| Retrieves the current orientation of the device on one of its 3 axes. |
|
|
|
|
|
|
|
| When creating an executable, you can choose not to use a library or not to include all the elements of the project in the library...... |
|
|
|
|
|
|
|
| Moves a column in a Table or TreeView Table control. |
|
|
|
|
|
|
|
| Entirely or partially locks an external file. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|