<<

$7.00 U..

Inside: Developing User Interface Standards International Plus! Who Owns the

® Data? SSpecpecThE Multivalue tettchnologyrr ummumagazine i Mar/Apr 2011

Character Encoding

Getting Ready for the World Stage

intl-spectrum.com Advanced 6 Spec_Layout 1 2/14/11 2:22 PM Page 1

Advanced database technology for breakthrough applications

This makes applications fly.

Embed our post-relational database if you Caché eliminates the need for object-relational want your next application to have breakthrough mapping. Which can reduce your development features, run withC abclahzéing speed, be massively cycle by as much as 40%. scalable and require mi®nimal administration. Caché is available for all major platforms – InterSystems has advanced object and it supports MultiValue development. Caché is technology that makes it easier to build applica- deployed on more than 100,000 systems world- tions with XML, Web services, AJAX, Java, and .NET. wide, ranging from two to over 50,000 users. And Caché can run SQL up to 5 times faster than For over 30 years, we’ve provided advanced

relational databases. ™ software technologies for breakthrough With its unique Unified Data Architecture , applications.

Visit us at the International Spectrum Conference, April 4-7, 2011, West Palm Beach, Florida.

InterSystems.com/Advanced6WW

Download a free, fully functio© 20a11l ,In tnerSoys-tetmism Corpeor-altiomn. Alil rtig hctso repseryve do. Inft eCrSyastecmhs Céach, éo is ra ergiesteqredu treadsemta rikt oIntnerS yDsteVmsD Cor,p oaratti on. 2-11 Adv6Spec International

® SSpecpecThE Multivalue tt terrchnologyumum magazine

features I March/April 2011

Character Encoding It’s a small world and getting smaller, Business Tech: User Ownership of Data Gone are the days especially6 thanks to the and 10 when the Data Processing department was both keeper and defender web-enabled applications. Whether of the data and parceled it out to users on green bar reports where they due to a business expanding into could look but not touch. Today’s users insist that data be presented to international markets or acquisitions by, them in such a manner that they can manipulate it, summarize it, use it, or partnering with, foreign companies, and even lose it. This provides the modern IT department with a new set many applications are finding a need of challenges. By Charles Barouch to be multilingual, not just MultiValue. Sending from Your MultiValue Programs — Part 2: So how do you represent the different 12 Using IIS Part 1 of this series of articles showed you how to construct non-English characters? By Brian an -mail, including the necessary items in the header and body. So Leach now you have it, what do you do with it? There are a variety of ways to actually send e-mail. We start by introducing you to SMTP using Microsoft’s Internet Information Server. By Nathan Rector

MultiValue and QuickBooks, Part 2: Exporting to 14 MultiValue Many MultiValue accounting packages lack the GUI interface modern users demand or other features that are considered to be mandatory by anyone who has used a modern accounting application. One option is to replace it with an off-the-shelf commodity accounting package and share data between it and the MultiValue Departments system running the core business functions. Part 1 dealt with getting data from MultiValue to QB. Now we go in the other direction. By Mark Johnson From the Inside page 4 First Steps to Securing Your Information in the Internet From the Press Room page 16 20 Age While computer and data security is a large and complex subject, Clif Notes page 31 it is disconcerting how many MultiValue systems do not even take the most fundamental precautions to protect user data from unauthorized access. Just a couple of straightforward techniques can prevent that kid on the coffee shop WiFi from stealing your access and walking through your system at will. By Bryan Shumsky, Revelation Software

User Interface Design: Defacto Standards and Unicorns 24 The green screen may be dead, but graphical user interfaces bring with them their own set of issues. Because of their flexibility, a set of GUI-

International Spectrum and MultiValue based programs in an application written by different programmers, are registered trademarks of International each with their own opinion and style, can be even more difficult to Spectrum, Inc. All other registered understand, use, and navigate than the old green screens. But do user trademarks are the property interface standards appear magically? By Susan Joslyn of the respective trademark holders.

INTERNATIONAL SPECTRUM March/April 2011 u 3

International From the Inside N a a n R e t o r SpectrumMarch/April 2011 Nathan Rector President

Clifton Oliver Editor

Welcome to the International Spectrum 2011 Conference! Tracey Rector Layout For those who are here in Florida, Welcome, Enjoy… I’ sure we will be talking throughout the conference. For those that were unable to make it, don’t feel left out. Spectrum 2011 has two events: Live and Virtual. Our Live event is full of education and networking, I know many of you wanted to join us but were unable to join us due to budget constraints. Learn more about the MultiValue and see This is where the Virtual conference comes in. April 12–14 are the dates what MulitValue Technologies and MultiValue for the Virtual part of our conference. Now, the question you likely have Communities exist to help you support and manage is — what is the differences? your business and systems. To find out more visit http://www.intl-spectrum.com Well, it’s not different but an extension of the Live conference. Trying to find all the solutions available to you can sometimes be hard and time MISSION STATEMENT International Spectrum consuming, but the Live and Virtual conference allow you to see all the magazine’s editorial mission is to be the premier independent source of useful information for users, developers, and resellers products and services in one place. of MultiValue database management systems, open systems business database solutions, and related hardware, software, The Virtual Conference provides you access to our sponsors to either initi- and peripherals. Published bimonthly, International Spectrum ate new conversations, or continue ones that you have started at another provides comprehensive coverage of the products, companies, and trends that shape the MultiValue marketplace as well as the time. Each of our sponsors has access to our Instant Message servers to computer industry at large — helping its readers get the most schedule available times when they will be free to talk with you. Some of out of their business computer systems. the sponsors may be providing you the ability to talk with different people within the company as well. In to the Instant Message chats, you can access and download On-Demand Videos provided by the exhibitors. These give you even more information about vendor products and solutions. m .ENTERPRISE Mentor Pro Some, though not all, of the Live conference sessions will also be available MO/E Native PICK On-Demand during that time as well. The On-Demand session will give you the basics you may need or want to get started with a solution to p c Verse PICK OA whatever problem you are looking to address. tm Power95 For those of you here at the Live conference, you get access to the Virtual content as well as part of your attendance to the Live Conference. Also R91 REALITY AP/PRO keep a look out around the conference for the QR hunt. You may win something. m u t i Verse RPL

m v •BASE

-Nathan Rector International Spectrum is published six (6) times per year at the subscription price of $40.00 U.S. in the U.S.A.; $45.00 U.S. President, International Spectrum in Canada and Mexico; $50.00 U.S. for other countries. Single copy rates are $7.00 U.S. in the U.S.A. and Canada, and $9.00 [email protected] U.S. in all other countries. International Spectrum is published by International Specturm, Inc., 8956 Fox Drive #102, Thornton, CO 80260; Tel: 720/259-1356; Fax: 603/250-0664 E-Mail: request@ intl-spectrum.com. Copyright 2011 International Spectrum, Inc. All rights reserved. Reproduction in whole or in part, without written permission, is prohibited.

PRINTED IN USA NEWS RELEASES/UNSOLICITED ARTICLES International Spectrum is eager to print your submissions of up-to- the-minute news and feature stories complementary to the MultiValue marketplace. Black and white or color photographs and diagrams are welcome. Although there is no guarantee a submitted article will be published, every article will be con- sidered. Please send your press releases, articles, and queries to: [email protected]. International Spectrum retains all reprint rights. twitter.com/intlspectrum intl-spectrum.com/facebook International Spectrum is a registered trademark and MultiValue is a trademark of International Spectrum, Inc. All other registered 4 u INTERNATIONAL SPECTRUM March/April 2011 trademarks and trademarks are the property of the respective trademark holders. Application Developers just got a brand new bag. And we continue to fill it with the tools you’ll Source Code Management allows developers need to get the job done; this time with SQL to save a unique copy of every program Connector and Source Code Management. compiled, as it is compiled, and allows for SQL Connector provides the ability to easily easy versioning of those compiled programs. connect OpenInsight to a SQL database. With Source code can be grouped in modules and this connector, SQL tables are now seen as the different versions of source code can be native tables to all components of OpenInsight compared to evaluate differences. including forms, reports, popups and stored You won’t believe how easy it is to make your procedures. The O4W web development toolkit applications and data available anywhere when can also be used against SQL data once the SQL you develop them with OpenInsight 9.2.1. data is attached to OpenInsight. A very handy Visit our website and download your tool, indeed. evaluation copy today. Character Encodings

By Brian Leach

istorically, few MultiValue marker characters — the field, value, Below 128, all characters were predict- developers have needed to subvalue and text marks — sitting at able, and so a character and its encod- Himmerse themselves in the the top of the table. ing went hand in hand. If you are an murky waters of character encodings. English speaker, you can treat the two But in today’s world, with ever great- ANSI as synonymous: CHAR(65) is a capital er internationalization, a basic grasp ASCII was fine and dandy so long as you A is a capital A is always a capital A. of encoding is becoming essential — spoke English, but inevitably those pes- Above 127, and a character only makes whether working with email, web pag- ky foreigners wanted in on the act and sense if you understand its context, , client languages such as those in the all those extra characters from 128-255 which in the case of the ANSI stan- .NET platform, or for data storage and proved an irresistible lure. The ensu- dard meant knowing the for transfer. ing free-for-all created complete chaos which it was intended. until the ANSI standard came along to and internationalization are far This presents some problems. Receive put things right. Under this standard, too large a subject to cover in a single character 138 as part of a document the first 127 characters were kept for article, so this will give a high level un- from an international partner and you good ol’ ASCII (required for program- derstanding of how modern character may need to know whether to display a mers — since all major programming encoding works, how it came about — Cyrillic capital letter LJE , a capital languages and operating systems are and why you need to know about it. S with a or any of a dozen still derived from English today) and different variants. In short, knowing a those from 128 up assigned to various The ASCII Era character value alone is not enough. regional languages through the appli- MultiValue databases typically use an The link between the character value cation of different code pages. So by eight encoding scheme, which and its intended meaning had been setting your Windows PC to use page dates back to the days when all com- broken. 874 you could render Thai characters puters spoke English and IBM was or to page 1251 if you wanted Cyrillic. still clinging on to EBCDIC whilst the Unicode Similarly if you look through a VT100 rest of the industry was standardising The ANSI code page approach had emulation manual, for example, you around ASCII. Within the ASCII model three huge drawbacks: it was only will find selection commands between all necessary characters in the English useful if your character set could be US English, Finnish, and French code speaking world could be fitted neatly crammed into the extra 128 characters pages, amongst others. into seven along with certain available in a code page, which ruled control characters and . All of which was good news, so long out a lot of the far eastern regions; it This even left a whole bit to spare on as you only ever worked within one re- only really worked if your language was the then-prevalent eight bit architec- gion, and you didn’t need anything too composed of discrete characters, again tures, and different technology groups complex like many of the far eastern ruling out languages that use combin- decided to use this for their own devi- character sets. But it also set an impor- ing characters to form a single symbol; ous purposes: giving rise to our own tant precedent. and there was no standard way to com-

6 u intl-spectrum.com municate which code page to use. Oh a series of double characters with and naturally enough, DOS, Windows, A common misconception the unused byte set to zero. and various types of all tended to is that Unicode operates True double byte has the advantage of use different code pages. similarly to ASCII consistency. It is just as easy to move Clearly what was needed was one sin- forward and back through a regularly gle standard to unite them all into one but with a lot more double byte string as it is through a series — one that could define every characters, and that these single byte string, so long as you can possible regional character, symbol, ignore brain-dead C routines that ex- combining character and, for good are represented as double pect 0x0 as a string terminator and you measure, various mathematical and byte (16 bit)... know the order in which the two bytes engineering symbols, while not forget- are combined. The question of big-en- ting historical languages like Anglo-Sax- Unicode and Character dian or little-endian is something over on, Ogham , hieroglyphs, and mythical Encodings which manufacturers cannot agree, so languages like Tolkein’s Tengwar and A common misconception is that Uni- your Notepad document also includes By Brian Leach Cirth(fig. 1). code operates similarly to ASCII but a lead-in character known as a or BOM which shows as So the computer industry did what it with a lot more characters, and that 0xFEFF or 0xFFFE depending on the does best and bravely set up two com- these are represented as double byte architecture and which can be used peting standards: ISO 10646 defining (16 bit) giving a maximum of 65,536 to identify which way round these are the UCS (Universal Character Set) and possible entries. coded. Character handling routines are Unicode. Fortunately for all, reason ulti- One reason for this misconception is expected to byte swap as required. mately prevailed and the two standards that Windows originally offered double But Unicode is not a 16 bit encoding harmonised, so for developers today byte characters as a way of encoding standard. Unicode is the standard of choice. far eastern sets, and development tools In reality, Unicode and UCS are noth- But that is far from the end of the sto- such as Delphi and C# currently define ing more than classifications. Their ry. a 16 bit char . If you are an English or European language speaker, purpose is to simply define a global save a Notepad document as Unicode code table that assigns a positional val- and it will indeed write the content as ue to each character (known as a “code Continues on page 8 How UTF-8 Encoding Works UTF-8 uses a progressive scheme to encode characters, in which the most popular (to the American audience) characters are held in a single byte and the more obscure (to the same audience) expand into up to 6 bytes. UCS characters U+0000 to U+007F (ASCII) are encoded simply as bytes 0x00 to 0x7F (ASCII compatibility). This means that files and strings which contain only 7-bit ASCII characters have the same encoding under both ASCII and UTF-8. All UCS characters above U+007F are encoded as a sequence of several bytes, each of which has the most significant bit set. Therefore, no ASCII byte (0x00-0x7F) can appear as part of any other character and all possible 231 UCS codes can be encoded. The first byte of a multi byte sequence is always in the range 0xC0 to 0xFD and it indicates how many bytes follow for this character. The bytes 0xFE and 0xFF are never used in the UTF-8 encoding, which is good news for field marks. The following byte sequences are used to represent a character. The sequence to be used depends on the Unicode number of the character: U-00000000 – U-0000007F: 0xxxxxxx U-00000080 – U-000007FF: 110xxxxx 10xxxxxx U-00000800 – U-00007FFF: 1110xxxx 10xxxxxx 10xxxxxx (etc) Fig. 1 INTERNATIONAL SPECTRUM March/April 2011 u 7 The PHANTOM running in the background Character Encodings UTF-16 is the regularly spaced double ® byte encoding we just met. That’s good SpoolerPlus Continued from page 7 enough for most international text un- The PHANTOM running in the background Generic Pick® Spooler for point”). What they specifically do not less you really have a burning need Universe®, Unidata®, define, is how those characters should to display Elvish or some mathemati- The PHANTOM running in the background and QM be stored or encoded. And so far, they symbols. It is not compatible with (includes Reality syntax) define a 32-bit character set (216), so � ASCII but it is relatively easy to navigate The PHANTOM running in the background Run generic Pick® software in a double-byte encoding just isn’t enough and if your data is in ASCII you can eas- friendly Pick-flavor account to hold all possible entries. without modifying your print ily translate between the two by either processes. Now if you’re an English speaker still adding or stripping off the zero byte. The PHANTOM running in the background But even so, that’s extra work and who � Use STARTPTR, SP-ASSIGN, working with the 7 ASCII , the SP-EDIT, LISTPTR, LISTPEQS, thought of all those extra bits might needs that? The PHANTOM running in the background :STARTSPOOLER, etc. as usual. be a scary and you may feel aggrieved So the popular alternative in the West- � Reassign printers to print queues, at having to store them all. And then ern world is UTF-8, the brainchild of The PHANTOM running in the background Plus reconfigure the for there are all the legacy data and docu- Ken Thompson who famously devised the print queue automatically. ments that predate Unicode — what it on a New Jersey diner placemat. The PHANTOM running in the background � Avoid retraining personnel in new, should you do with them? less flexible print procedures. UTF-8 uses a variable number of bytes In fact, there are many different ways to encode a character — anything be- Get all the facts before you buy. The PHANTOM running in the background Contact: in which Unicode characters can be tween one and six bytes. This makes encoded: BMP, UCS-2, UCS-4, UTF-7, it expensive for documents that use Sysmark UTF-8, UTF-16 and UTF-32 amongst characters at the far end of the Uni- The PHANTOM running in the background Information Systems, Inc others, along with the old code pages code table, but has the huge advantage Reseller Inquiries Invited that can show some, but not all, charac- that the first 127 characters can fit into The PHANTOM running in the background Worldwide: UK: ters. But out of this bewildering series, 800-SYSMARK Brian Leach Consulting Ltd a single ASCII-compatible byte. So you (800-797-6275) [email protected] the chances are you will be introduced can take your ASCII document, mark it [email protected] www.brianleach.co.uk The PHANTOM running in the background www.sysmarkinfo.com to either UTF-16 or UTF-8. as UTF-8 and sit back knowing that you are now in the modern world. Scheduling and automating jobs, Specifying the Content Type Handling text is no longer just a mat- Increasing efficiency ter of scanning bytes. In today’s world  knowing the encoding scheme mat-  ters. For email, this is specified using the Content-Type header. For a web page, this uses the meta tag:

Note that this is actually inside the HTML document and the browser needs to parse past the and tags to get that far. Which just proves that text encoding isn’t something to be scared of but it is something that needs to be under- stood. IS

Brian Leach is an independent Mul- tiValue consultant living in the UK. He is current President of the U2 User Group mvpjp.com   and author of a number of books on Uni- MULTI-VALUE PHANTOM JOB PROCESSOR Verse programming. 8 u intl-spectrum.com Come see us at the Spectrum Conference, April 4-7. The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background The PHANTOM running in the background Scheduling and automating jobs, Increasing efficiency

mvpjp.com MULTI-VALUE PHANTOM JOB PROCESSOR

Come see us at the Spectrum Conference, April 4-7. Business Tech User Ownership of Data

By Charles Barouch

People Who Live in Glass ist have seen the sea change. Workers of people with diverse skill levels and Houses Shouldn’t want to get work done, and if IT is per- training” the ability to manage access In the beginning, data belonged to the ceived as a bottleneck, there are ways becomes massively harder. For an easy hierarchy of priests who dwelt in the around them. Remember, bottlenecks example, in the glass house days, se- rooms of glass, where cleanliness was create frustration and frustration can curity had little to do with user rights more important than godliness. And turn to anger. management. Now many organizations the priests spoke unto the people, and depend on one or more full-time LDAP Unfortunately, some of that anger has they said, the data is ours and you shall administrators to control rights. When been turned against IT people who not partake of it without a proper help a task which used to be a minor project never acted like high priests. Oddly, desk ticket. You shall not partake of it becomes a full time job, that’s a sign of some of the people who have taken until our schedule allows. Our claim is a major change in the rules. up this negative attitude weren’t in the greater than yours. You do the mun- workforce when the war ended. Some Even if you manage security to five nines dane work of generating revenue, but weren’t even born at that point. It’s an precision, you can still have employees we spend our days in the contempla- exercise in conditioning that would who do not understand the sensitivity tion of the code. make B. F. Skinner proud. of the data they are allowed to access. And the people were demoted from If Sally in accounting talks about that For better or worse, the data is in the co-workers to mere users. And the million dollar banking snafu at a cock- hands of the users. Smart IT people priests looked down upon them and tail party and Martin, who works at a see these people as co-workers, as cre- thought ill of their priorities. It was a competitor, overhears... So, when data ators, and owners, not just as “users.” time of great darkness and, eventually, moves from the few to the many, we All in all, it is for the better. So, if user’s the very fabric of computing was rend- as good citizens of our company need own the data and user ownership is a ed and remade until the priesthood fell to raise the issue of staff confidentiality good thing, and we like to advance the from grace. training. cause of good things happening, what A Byte in The Hand does user ownership of data mean to Of course, inappropriate dissemination the IT professional? of data is often less dangerous than mis- Computers moved out of the clean understanding data. rooms. They were forced to move out. Look Before You Leak Frustrated users brought PCs and other One thing it means is that Security is Baa, Baa, Spread Sheet, tools into the workplace to allow them much harder. Just like in every other Have You Any Wool to directly manipulate their data, their part of life, when something goes from Joe plugs in his data, collected from the way, on their schedule. The spread- “tightly controlled by a handful of peo- corporate system of record, and runs sheet became a weapon in the war to ple who operate in a single group” to his many spreadsheet formulas against get around the priests of IT. Even those “generally available to a wide variety it. He proudly sends the results up to shops where the glass houses still ex- his manager, Angela. She looks at his 10 u intl-spectrum.com work and concludes that the corporate test order entry, they will expect it to system needs to be replaced because For better or worse, the reject certain combinations of prod- this is the seventh time this month that data is in the hands of ucts because they can’t be shipped she has gotten conflicting data. Joe’s re- the users. Smart IT people together. They’ll expect that our fire- port shows a gain of 5% over last year. works shouldn’t be allowed to Frank’s report shows a loss of 3% over see these people as co- ship into certain states. They’ll expect the same period. workers, as creators, that quota will be checked on exports from China to the US on some classes Why? Is it because one of them did a bad and owners, not just as of goods. job in manipulating the data? Maybe. It could also be that Joe has more access “users.” The problem with IT ownership of to data than Frank, so Frank’s numbers data is that we live on the wrong side only include three divisions while Joe things are easier to sort out. Reducing of the screen. People who live and die is including five divisions. It could be the number of people does not elimi- on the details of a particular transac- as simple as “What does ‘day’ mean?” nate the errors, but it does allow for tion set are better able to see the holes. Joe might be including weekend sales rehabilitating the errors faster. They can tell if we’ve made things tight into Monday, which at the break of the enough. They know if it is too restric- year pushes a lot of money from De- Data, Data, Quite Contrary tive. IT needs to partner with the users. cember 30th (last year) to first week So, user ownership of data is a bad We need to elevate each other to the in January (this year) which changes thing, the priests were right, and ev- level of co-workers. both totals. It could be because Joe is erything should go back to how it was. What we bring to the table is knowl- looking at Dollars and assuming gross, No. No. No. User ownership of data is edge of the architecture of the data. We when Frank is looking at the same col- more complex, but it is a good thing. know how it glues together. We know umn and knows that it is net of stan- To start with, IT knows if the data ties if a particular piece is being collected. dard overhead. Perhaps Frank pulled out but users know if the data is cor- We know where it is being used. Just his data three months earlier. rect. For example, when I test order entry, I’ll set up a customer and buy as we know the structure (schema), When you have a limited number of some products. When the sales people the users know the content and the people doing the reporting, these Continues on page 29

INTERNATIONAL SPECTRUM March/April 2011 u 11 by Nathan Rector Sending E-mail from Your MultiValue Programs Part 2 – Using IIS

ast issue I talked about how program, when in reality it is outside of If you are on a Linux, AIX, or *nix sys- to create a simple e-mail, with your control. tem, you’ll likely need to setup SAMBA headers and body and all. In this or FTP to be able to write to a specific L An example of this is when your com- article I’ll start talking about how to Windows directory. pany e-mail admins implement “Relay take the e-mail you formatted and get it Authentication.” This requires you (See the web site to find examples of sent from your system. to provide username/password along writing text and sequential files to the You have several different options to with your e-mail message to your send- O/S.) consider, depending on which host ing program. This can be problematic system your MultiValue database is on. if you are using TLS encryption for re- Getting SMTP Up and laying. Running yy IIS (Windows) If you haven’t used the SMTP service While these are important issues, they yy SendMail (Linux/AIX/*nix) before, it must be running on your IIS are outside of what we are going to server. The SMTP service is part of the yy Blat (Windows) cover in these articles. default IIS installation. If you performed yy Exchange Email Server (Windows) Since we have to start somewhere, we a custom IIS installation and chose not will start with IIS (Internet Information to install the service, you can easily add yy Native SMTP client Server). it from Control Panel Add/Remove There are many other options de- Programs. To do so, open Add/Remove pending on the SMTP server you use Why IIS? Programs, click Add/Remove Windows in-house. Some of these have easy e- Most of us have a Windows XP, 2000, Components, select the Internet Infor- mail sending interfaces. Others require 2003, or 2008 server on site. This mation Services check box, and then some scripting, but all are available to means we have an IIS server available click Details. you. to us to send e-mail with. IIS includes In a default IIS installation, one SMTP a SMTP service that you can integrate While sending e-mail using an SMTP server is installed. You can verify that into your database process without any server is easy, getting your SMTP server it’s running by opening Internet Ser- extra third-party tools or command-line setup and accessing the Internet cor- vices Manager (ISM) and viewing the tools. rectly is a much larger topic. When SMTP server. FTP sites appear first, setting up an SMTP server or client, The only requirement is getting the followed by web sites and SMTP sites. you need to consider all the security e-mail written to the Windows ma- If the SMTP server isn’t running, right- features the SMTP server may be imple- chine that you have the SMTP Service click it, then select Start. menting. installed on. Writing these files to the windows machine will vary depending Smart Host Configuration Spam filters, Relay authentication, Do- on the type of database you have. If Now, let’s look at a few of the ad- main Keys, and many other issues can you do not know which MultiValue Ba- vanced configuration options. Most cause your e-mails to be rejected by sic functions to use, look for OSWRITE, large or enterprise companies place the server. This may look to your us- WRITESEQ, or pointers that allows SMTP servers behind firewalls that ers or systems admins as something you to write to a specific directory lo- block any direct outbound SMTP traf- being wrong with your e-mail sending cation. fic through port 25. If such is the case in your shop, your e-mail messages will

12 u intl-spectrum.com end up in the Badmail folder with cryp- tic router error-message files. If a smart host is available on your network, you can use it to relay all SMTP messages to the Internet. In most cases, a smart host is simply another SMTP server with permission to relay outgoing e-mail messages from other internal SMTP servers directly to the Internet. Thus, a smart host should be able to connect simultaneously to both the internal network and the In- ternet to work as the e-mail gateway. If this setup exists in your company, you can simply add the IP address of the smart host on your network and IIS will send its e-mail messages to that SMTP server for relay to the Internet. To set up a relay to a smart host on an IIS machine, follow these steps: Open ISM, right-click the SMTP server, then select Properties. Click the Delivery tab, and then click Advanced to open the Advanced Deliv- ery dialog box, which figure 1 shows. Fig. 1 In the Smart host field, type either the smart host’s Fully Qualified Do- main Name (FQDN) or its IP address surrounded by square (e.., [10.1.4.25]). The brackets help speed up the DNS lookup process by specifi- cally telling the SMTP server that the numbers are an IP address. Click OK twice to complete the changes. In the Advanced Delivery dialog box, notice the Masquerade domain field. The masquerade domain makes an e- mail message look as though it came from a point other than its true origin. You can easily fake return addresses on e-mail messages. For example, if I enter “MyDomain.com” in the Masquerade domain field, mail messages would ap- pear to come from addresses such as [email protected].

Send E-mail Now comes the easy part. All you need to do is write your e-mail item to the following directory with a unique file name and the extension of “.eml”. Continues on page 26 INTERNATIONAL SPECTRUM March/April 2011 u 13 MultiValue and QuickBooks Part 2: Exporting to MultiValue

By Mark Johnson

n my first article, I explored how modify the sort sequence, we are stuck we can export multiple MultiVal- We MultiValue with the sequences pre-programmed I ue data files as transactions into professionals are used into QB. Coming from a full-access QuickBooks. While QB allows the im- database (MultiValue), I get frustrated porting of standard CSV or tabbed files to having full access to when trying to create custom reports or Excel spreadsheets, it has a private our data to manipulate using this pretty popular file. format called IIF whereby a In all QB reports there are prompts re- can contain rows with multiple table it in any fashion that is garding single or all customers as well definitions as well as actual data. necessary to satisfy the as date ranges. You may be able to fil- In the other direction, it will become requests of our users. ter in or out specific transactions. But evident that QB will appear “short” in that’s about it, database-wise. the eyes of a seasoned MultiValue pro- the same database that the application One request in particular was to pro- grammer. Meaning, while the stock is running. You would be careful to not duce an open AR report by customer reports and modified reports (memo- update anything unless you fully under- and have each invoice within each rized) within QB may satisfy a QB-ori- stand the application itself. That goes customer be in date order. The stock ented user, your client’s requests for without saying with any “back door” Detail report from QB would be in date more advanced reporting may not be access to the underlying database. order only and reviewing each custom- possible within QB. For retrieval purposes only, you don’t er from this report is nearly impossible. While there certainly is some form of have to worry about “rocking the boat” The Summary report is in customer or- database within QB, there really is no with the application. You can cherry- der but doesn’t show any detail. direct access to it. Their reports drop pick whatever fields that you need. Virtually all QB reports can be directed down and the ability to take stock re- to a printer for obvious printing or to ports and modify the columns and se- In my decades of slicing and dicing a a spreadsheet for external review. This lection criteria is better than simply raw Open Accounts Receivable file is our connection to get the data from stock reports alone. But we MultiValue within a MultiValue system, I find the QB into regular MultiValue fields for professionals are used to having full ac- QB stock reports adequate and their our use. cess to our data to manipulate it in any modifiable parameters to be average. fashion that is necessary to satisfy the Obviously QB isn’t perfect otherwise I When you open a stock report, you can requests of our users. wouldn’t be writing this article. see a “modify” button. Stock reports will have a fraction of available output On other systems, you may be able to There are two separate reports, Sum- fields pre-checked. You would check use Crystal Reports or MS Access to hit mary and Detail, but since we cannot

14 u intl-spectrum.com all the fields that you would need. The Fourth — For most companies that use sort sequence is of no concern with MultiValue, the accounting department PICK this exercise, although you should in- is not as important as the departments PROFESSIONAL sure that the user make the date range that align with the company’s business as wide as possible to accommodate function. Whether manufacturing, pro- Don’t make the mistake of placing your career in the hands of just ANY their request. duction, inventory, distribution, logis- search firm. We are professionals who tics, or other business functions, most understand the importance of Then the user would run the report and companies that use MultiValue are not CONFIDENTIALITY and RESPECT of a send it to an Excel spreadsheet. Now job search, and our database of clients accounting companies, ie. CPAs, banks, we take over with any popular Multi- is one of the largest in the country. brokerages etc. Thus, their program- Unlike the rest, we will work in YOUR Value tool to import a spreadsheet into ming dollars over the years has gone to best interests’ to help you further your a standard MultiValue data file. career. Because of our dedication and core business improvements and not professionalism, we are recognized as Once imported, now the world is our helping those in the accounting depart- the leaders in the PICK/UniVerse/Unidata placement industry in the Tri-State area oyster. We can sort and break-on with ment. This leaves the door open for QB and throughout the U.S. So if you are standard MultiValue commands or or other larger networked accounting tired of putting yourself at the create highly specialized reports us- environments to come in. mercy of the rest. ing MultiValue Basic. In either case, Sidebar — From a recent conversion CALL THE BEST! Contact... the user gets the best of both worlds. away from a 20+ year highly evolved Matt Hart The only issue would be the timing be- MultiValue full company system to tween the two systems. EXECU-SYS, LTD Great Plains, the accounting portions 1 Penn Plaza, Suite 3306 There are inherent reasons that ac- (AP, AR, GL) were outstanding and New York, NY 10119 counting departments use QB or other made the bean counters happy. The (212) 967-0505 external systems. My two cases have a manufacturing and inventory mod- (800) 423-1964 302 few reasons of their own, and it’s hard ules of Great Plains were very “plain” Fax: (212)947-8593 Email: [email protected] to debate from our perspective. (pardon the pun) and when the full conversion was complete, 80% of the First — The incoming pool of clerical Consultants Needed Nationwide company felt it was a step backwards talent is much younger and certainly from their highly tuned MultiValue ap- would not have experience with a plication. C’est la vie. traditional green screen environment. Their experience with anything GUI, No one asks us whether to retire part especially the Microsoft experience, or all of our beloved MultiValue appli- will naturally cause them to type cer- cations in lieu of a shiny new (albeit tain expected commands, for more plain) system. We are usually in- Save, to Print etc. Even if you formed when it is too late to make a have converted many of your long-term counter offer. MultiValue apps to GUI, there may be Thus, we should embrace the oppor- the chance that it doesn’t follow the tunity to manage both environments, Microsoft model. knowing that we still have plenty of Second — Along that Microsoft expe- work on both systems. IS rience, virtually every command and function has a keyboard shortcut. As a Mark Johnson is an independent MV novice MS GUI programmer and expe- rienced Accuterm GED programmer, I consultant with over 30 years experience barely add them as I usually don’t have on virtually all platforms. He specializes time for them until moving to the next in maintaining legacy systems, helping his project. clients maximize their investment while Third — Companies like QuickBooks participating with current technologies. have invested zillions of dollars and man-hours into perfecting the user in- When the time is right, he facilitates mi- terface and application, despite being grations to the proper contemporary plat- somewhat limited in complex database form. He can be reached at majprogram- reporting. You can’t argue with the ex- tent that QuickBooks is installed. [email protected] or 908-601-4052. INTERNATIONAL SPECTRUM March/April 2011 u 15 Fr o m t h e Pr e s s Ro o m

“The response to our O4W v1.0 Software delivers a suite of ap- integration. Click-2-View can be product contained with OpenIn- plication development tools and configured to offer the user the sight 9.2 was so well received companion services that take ability to select a single docu- that we placed the majority of full advantage of leading net- ment or search for any group of our development efforts into the work computing architectures, documents relevant to the infor- Revelation extension of O4W,” said Mike messaging, groupware, and mation displayed on the applica- Software Ruane, President/CEO Revela- client server platforms. Today, tion screen. Click-2-View can be tion Software. “Our development the company’s flagship product setup quickly and can be used Announces community asked for many new OpenInsight is the only data- with more than one application the Release of features to be included in the base development and applica- on a user’s desktop. next release of O4W, and we de- tion environment that provides OpenInsight Version 8 of UnForm is a plat- livered!” both Windows and Java-based form-independent software Development GUI s tools to develop and The Universal Driver 4.7 and product that creates, delivers, deploy web-based and client Suite 9.2.1 and Universal Driver 4.7 (NUL) have stores, and retrieves graphically server applications that support been released in conjunction enhanced documents from ERP the Universal native and relational XML, SQL, with OpenInsight 9.2.1. The Uni- application printing. A complete, Lotus Notes and the leading Driver 4.7 versal Driver 4.7 replaces the end-to-end Document Manage- legacy Multi-Value data sources Universal Driver 4.6 and will be ment Solution (DMS), UnForm Revelation Software announces such as Arev, Pick and IBM Uni- offered in two versions. The free interfaces at the point of print- the availability of the latest re- verse. There are more than 1.5 bundled version supplied with ing to produce documents in lease of OpenInsight Develop- million licensed users of Rev- OpenInsight 9.x network user li- various formats for printing and ment Suite (OI) 9.2.1 and the elation products across 60,000 censes and the standard version electronic delivery. Exact rep- Universal Driver 4.7. OI 9.2.1 deployed sites worldwide. The to be used with OpenInsight 8.x licas of these documents can provides the following new com- company has offices in West- and below as well as Advanced be stored in a secure archive ponents: wood, New Jersey, as well as a Revelation. for later retrieval by users via a European distributor in the Unit- • OpenInsight for Web interface, the new “The UD 4.7 (NUL) will now be ed Kingdom, and an Asia Pacific (O4W v1.1) – A web 2.0 Desktop Client, or via a power- supplied at no cost to all current subsidiary in Australia.  development toolkit that ful command line API, allowing members of our Works Sub- empowers OpenInsight document access to be built into scription program”, said Rob- and MultiValue developers any application. External docu- ert Catalano, Director of Sales, to rapidly create browser ments, such as scanned invoic- Revelation Software. “MultiValue based forms, reports, menus, es or signed delivery documents and SQL developers can pur- dashboards and programs. can be imported into archive li- chase OpenInsight as a front • Source Code Management braries for further workflow au- end development toolkit without (SCM) – With this new feature, tomation. our Linear Hash database at a source code can be grouped cost of $60.00 per user with a Version 8 of the UnForm Docu- into modules and saved as a Synergetic minimum of ten (10) users for ment Management Solution unique version as the code is Data Systems, browser-based applications. In- (DMS) has been widely received compiled. cluded are both the O4W web Inc. Introduces and implemented. UnForm has • Enhanced System Editor ++ development toolkit and the UD been deployed in over 9000 – Our system editor has been Click-2-View 4.7 (NUL) software.” companies in 15 countries. redesigned to improve speed Synergetic Data Systems, Inc. and functionality. OpenInsight Development Suite (SDSI)has announced the re- SDSI products add features, func- • U2 DotNet Connector – The 9.2 is available from Revelation lease of Click-2-View, our Desk- tionality, and value to hundreds U2 Connector has been Software, or through their net- top Client (DTC) application. of commercial software products redesigned to utilize the work of resellers. See Revela- Click-2-View is an application and custom applications. Laser UniObjects.Net library instead tion.com for details. that allows the UnForm Docu- forms, PDF document genera- of the InterCall libraries. ment Management Solution tion, electronic document deliv- This redesign allows the About Revelation ery, document archiving,report Software (DMS) to be integrated with implementation of connection any application accessed from writing, and unique control over Founded in 1982, Revelation pooling. a user’s computer without API Microsoft Office are just a few of

16 u intl-spectrum.com the many capabilities found in tion will increase throughput and • A Phantom Console program extensive toolset designed for our software. decrease the points of failure. for schedule maintenance creating Microsoft .NET- based and monitoring. applications requiring access to SDSI products are sold through For additional information please • An audit trail of historical MultiValue logic and databases, a network of hundreds of resell- contact DesignBais International events. mv.NET 4.2.2. ers, OEM’s, and distributors, as at [email protected] or call well as directly to independent +1 877-889-9777.  • Email notification of process mv.NET enables software design- end user customers. SDSI was completion and other ers to combine the power and founded in 1988, with the mis- phantom events. flexibility of proven MultiValue sion of creating unique and pow- • Flexible query screens technology with the feature rich erful software products. Today to assist in managing the Microsoft .NET environment. Its our software is used in major background tasks. seamless integration with Visual industries such as accounting, If you would like your computer Studio provides a potent rapid distribution, retail, manufactur- operations personnel to “work application development envi- ing, healthcare, and in hundreds Marc Kahn smarter, not harder” then we’ ronment fine-tuned for the Mul- of other industries.SDSI is the like to talk with you about add- tiValue developer. developer of the UnForm Docu- Software LLC ing MVPJP to your IT toolbox. As BlueFinity continues to roll ment Management Solution, as Announces the out groundbreaking enhance- well as other productivity tools About Marc Kahn ments to its flagship product, its for UNIX, Linux and Windows. Multi-Value Software LLC Phantom Job Marc Kahn has been active as developers are closely watching Contact: Dan Schmitt an independent software con- the market’s future directions to Synergetic Data Systems, Inc. Processor tractor since 1982. Early on he bring the latest technologies to 800-446-7374 Ext 125 was introduced to the Pick da- the MultiValue and .NET devel- Marc Kahn Software LLC is www.unform.com  tabase system, which has been oper communities. pleased to announce the product the focus of his software career launch of the Multi-Value Phan- “The on-going development since the beginning. Over the tom Job Processor (MVPJP). work on the mv.NET product years, he has provided custom range demonstrates BlueFinity’s MVPJP helps to increase the ef- programming, consulting, and determination, commitment and ficiency of your operations by product development services ability to provide the MultiValue scheduling and automating jobs for a wide variety of clients. community with industry leading to be run in the background. It For more information: development tools for the Micro- runs as an application within call 360-571-2232, soft .NET environment,” explains DesignBais your MVDB environment and email [email protected], David Cooper, Lead Developer is designed to be managed by International visit http://mvpjp.com, at BlueFinity. non-technical personnel. It is or chat with Marc at the Interna- Announces cost effective, user friendly, and “These tools allow the rapid cre- tional Spectrum Conference . Support for highly reliable. ation of state-of-the-art, industry standard applications which can the TigerLogic The core functionality of MVPJP be deployed across any of the D3 v9 .NET API was developed in 2005 as a wide range any of today’s in- tightly integrated add-on to Co- (MVSP) terface devices — workstations, lumbia Ultimate’s “The Collector browsers, handhelds, phones DesignBais International is proud System”, meeting with a high lev- and other mobile devices.” to announce support for the Ti- el of acceptance in that market- BlueFinity gerLogic D3 v9 .NET API (MVSP). place. The original software has mv.NET 4.2.2, This support will allow D3 users now been modified to run on mv.NET 4.2.2 available now, includes the of DesignBais to use the native any MVDB platform which sup- ports background processing. Enhancements following D3 v9 API to connect between enhancements: the DesignBais Web component In accordance with the BlueFin- In addition to running the sched- • D3 R9.Official support for and the DesignBais Database ity roadmap, the development uled jobs automatically, MVPJP D3 Release 9 and mvBASE team at BlueFinity International component instead of a third offers: party component. This connec- has released a new version its Continues on page 18

INTERNATIONAL SPECTRUM March/April 2011 u 17 Fr o m t h e Pr e s s Ro o m

Continued from page 17 • C# code generation from Entity Modeller and the XAML and databases. Release 3 plus support Solution Objects. Full support Wizard. Today, we have a wide suite of for the new MVSP socket for Solution Objects to For more products, tools and services connectivity. generate C# code as an information: that assist our customers in a • SSH-based connectivity alternative to Visual Basic. Contact [email protected] for wide range of data middleware, support. Enhancement to • XAML Wizard chart more information or register for BI, portal, mobile and other ar- support secure connectivity designer. New functionality a free trial or online demonstra- eas. Some of our products have (SSH) over IP based to the XAML Wizard to tion at www.bluefinity.com.  value to both mainstream and connections for all databases enable data visualization MultiValue customers. This has supported by mv.NET. charts to be easily defined made it difficult to market these • Allow multiple EMR locations and incorporated into products without creating confu- to be defined and listed applications. sion. within Entity Modelling in Data • Auto-hide of data form As a result, we are announcing Manager. A convenience controls based on security. two new brands to allow our enhancement to allow Enhancement to the customers and partners to bet- multiple EMRs to be accessed Silverlight run-time support FusionWare ter identify the products, servic- within the Data Manager. to allow controls on a form es and bundles that serve them to be automatically hidden/ Has New • Support for the Silverlight best: AutoCompleteBox control. disabled based on user Branding: An enhancement to the security privilege. dbLynx and mvLynx for XAML Wizard to allow it to • XAML Wizard multiple MultiValue generate code incorporating language translation support. mvLynx Brands mvLynx identifies products, Enhancement to the XAML the standard Silverlight When we first started as Liberty services and bundles that are Wizard to allow foreign AutoCompleteBox control. Software, back in 1992, our uniquely targeted to the Multi- language translations to be This allows dynamic lists flagship product was the ODBC Value community. defined for all literal strings (representing data selections driver for PICK. This was the first used within Navigation dbLynx for from the underlying ODBC driver released outside (menus) and data forms.This Mainstream and MultiValue database) to be of Microsoft, and was clearly allows menus and forms to Relational displayed in a control similar targeted to the MultiValue Da- dynamically change their dbLynx identifies products, ser- to that used in web browsers tabase community. We rapidly language based on the vices and bundles that provide to capture the desired web ported this to support almost user’s locale setting.Screen value to customers who work URL address. every version of MultiValue da- content is automatically with our Microsoft, IBM, Oracle Plans for the tabase out there, including, at resized to take into account and Open Source solutions. March release of the time, R83, Universe, Unida- string length differences mv.NET 4.2.3 are ta, Microsystems, Sanyo/ About FusionWare across different language well underway ICON, and many more. with the following translations. FusionWare Integration is a lead- ing solutions provider special- advancements • Allow sharing of entities As we worked with our custom- izing in business intelligence, included: across models. Enhancement ers, we were often assisting them integration and middleware • Support for jBASE’s to the Entity modeller in as they integrated their MultiVal- products and services. jRemote connectivity Solution Objects to allow an ue data with many other envi- option. Enhancement to Entity defined in one model ronments, including SQL Server, We have been delivering lead- the connectivity layer of to be referenced and used in Oracle, DB2, Sybase, Progress, ing edge integration and busi- mv.NET to allow it take another. and many other databases. Of- ness intelligence solutions for advantage of the new secure ten, we had to do the research • Group entities together into more than a quarter century. sockets connectivity feature to figure out how to make these logical collections within The name may have changed within jBASE Release 5. environments integrate well, and Entity Modelling and XAML from Liberty to FusionWare but This provides increased even how to optimize the data Wizard. Enhancement to the same great team continues connectivity performance for that we had transferred over. The Solution Objects to allow to innovate and deliver solutions mv.NET applications running result of this is that we began to grouping of Entities into to companies of all sizes. against jBASE 5. develop expertise and tools to logical collections within the work with many other platforms From our early days as one of

18 u intl-spectrum.com the first providers of ODBC da- range of product and strategic 1,000 during his six-year tenure. help us deliver outstanding tabase connectivity solutions initiatives to facilitate the com- He was heavily involved in Nu- solutions to our customers and under the name LibertyODBC, pany’s next stage of growth. He ance’s highly successful initial accelerate our strong financial to providing solutions in web most recently served as chief public offering, which resulted results.” services, e-commerce and busi- marketing officer of Rivermine, in a market valuation of over $5 “I’m excited to be joining the ness intelligence, our strong a leading provider of automated billion. Datatel team,” said Shea. “The belief in standards and provid- solutions that enable organiza- Earlier in his career, Shea worked company has built strong cus- ing value to our customers has tions to control their communi- for Intel, Inc., and was a member tomer relationships and deliv- made us an industry leader. cations expenses. of its Pentium Processor market- ers leading-edge products to Our MultiValue data connection Shea brings over 20 years ing team that helped to grow the higher education market- products support everything of technology experience to product shipments from zero to place. I look forward to help- from the original ODBC to JDBC Datatel. He has a consistent over 10 million units per quarter ing colleges and universities to newer technologies involving track record of rapidly scaling in two years. He also has held realize new levels of value with Java, .NET and SQL Azure and businesses. At Rivermine, he marketing and technical posi- Datatel’s solutions.” are available for every flavour was responsible for overseeing tions at OnLive Technologies and version of PICK. The Inte- corporate and product strategy, and Booz, Allen & Hamilton. About Datatel, Inc. gration Server product is based product marketing/manage- Datatel is a provider of innova- Shea holds a bachelor of sci- on platform independence and ment, demand creation, mergers tive technology products, ser- ence degree in engineering standards based connectivity. and acquisitions, training, and vices, and insight to higher ed- from the University of Notre Web Services and XML are key corporate communications. His ucation. Colleges, universities, Dame and a master of business foundations to the FusionWare efforts resulted in the success- and technical schools across administration in marketing with Integration Server. ful acquisition of the company in North America partner with late 2010. highest honors from Northwest- Datatel to build Strategic Aca- Around the world, FusionWare ern University’s Kellogg Gradu- demic Enterprises dedicated to Before Rivermine, Shea served products and services have ate School of Management. achieving student success. The gained a loyal following among as vice president of product “John is an extraordinary addi- company has focused on high- Fortune 500 companies and marketing, management and tion to our executive team,” said er education since 1979. For organizations of all sizes, includ- corporate strategy for Nuance, John F. Speer, Datatel president more information, visit www. ing Elizabeth Arden Salons and the leading provider of speech and CEO. “His exceptional track datatel.com.  MeadWestvaco Calmar. solutions worldwide. Shea joined Nuance in 1998 during its early record in successfully growing For more information, visit http:// stages and was a key member technology businesses, deep  www.fwic.net/ of the management team that understanding of scalable mar- helped to grow the company keting processes, and keen fo- from four live customers to over cus on customer success will

Datatel e-xtra Newsletter Appoints John Stay on top of Industry News Shea as Chief Marketing Š Tech Tips Officer Š Job Postings Š New Products Datatel, Inc. today announced that it has appointed John Shea Š Corporate Updates as chief marketing officer. In this position, Shea will focus on a www.intl-spectrum.com/newsletter

INTERNATIONAL SPECTRUM March/April 2011 u 19 First Steps to Securing Your Information in the Internet Age

By Bryan Shumsky, Revelation Software

t the end of 2010, the Gawker none of us would relish the thought of plications accept confidential data, Media consortium of blogs was telling our customers, “Sorry, someone such as credit card numbers, and store A hacked. User accounts and has stolen your personal information them away as part of data records with- personal information for many (or all?) from my computer system.” Yet odds out thought as to whether they might registered users were taken. This was are we are as vulnerable to these at- be used again. This kind of data should particularly embarrassing for Gawker, tacks, or more, as the Big Guys. What be cleansed from the system. which counts amongst its properties can be done to make our systems more Of course, there is also confidential Gizmodo, the popular tech blog, the secure? data that cannot be removed from the opinion on the internet was that they database; a perfect example of this kind “should have known better.” Recognize You Have A Problem of data is the user password. In these It seemed, a few years ago, that you Does anyone access your computer, ei- instances, our goal must be to keep the couldn’t open the newspaper (or ther physically on a console, remotely data useful to our application, but use- watch TV news, or view online news via a network, or over the Web? If the less to anyone accessing the data im- sites) without seeing some story about answer is “yes,” then your system is properly. compromised corporate databases in vulnerable. Even if you only use RS232 the headlines. Lots of big companies Making Data Both Useful serial connections (remember them?) And Useless — credit cards, banks, credit report- to old-fashioned terminals (remember In order to achieve this goal, our main ing agencies — suffered from, and suc- them?), if someone has physical access weapon is encryption — specifically, cumbed to, attack. to your system, they can physically a type of encryption called “hashing.” extract the data. Modern PC-based Other than the Gawker incident, there A hash is a one-way encryption. When systems will have USB ports, but even hasn’t been much talk about this in the data is appropriately hashed, it is im- older dedicated MultiValue machines news lately. Have the attacks stopped? possible (or very difficult, and hope- had floppy drives. As the number and Most industry experts don’t think so. fully beyond the means of the major- types of connections to the outside Nor do they believe that all IT systems ity of hackers) to decrypt and find the world increase, so does your exposure; have somehow become so secure they “clear text” original information. This if your system is accessible from the In- are no longer vulnerable. Instead, means that you cannot ever “recover” ternet, there’s the possibility that any- companies have just stopped reporting the original data, which is sometimes one in the world can reach it. such attacks, in an effort to keep up inconvenient; but it also means that consumer confidence. After all, would Minimize Your “ Of loss of that data does not endanger the you want to deal with a bank that had end user’s account. For the remainder just lost your account information? Exposure” The first step towards securing your of this article, when discussing encryp- Our MultiValue installations typically system is to minimize the amount of tion in general, we are specifically re- present much smaller targets than, say, confidential or compromising data that ferring to hashing of data. Chase or Wells Fargo, but I’m sure that you store, if possible. Many of our ap-

20 u intl-spectrum.com While all of the MultiValue databases your server so that they could pretend encrypt the password used to access Do not attempt to create to be an authorized user. the fundamental user accounts, many your own encryption algo- OpenInsight’s web product, O4W, applications have additional passwords uses this enhanced method to protect that application developers build into rithm, or hashing scheme. the user data and prevent “spoofed” au- their login and authorization processes, Unless you are a trained thentication. The basic+ routine that and often these passwords are stored cryptographic analyst, it generates the login page builds a script in clear text. Even though you may not that includes the current date and time, consider any of the data in your applica- is unlikely that any "home and encrypts those values — along tion “confidential,” the fact that many grown" algorithm will with the user-entered password — be- users will re-use the same password fore sending the information back to for many different activities means that provide strong security. the server (fig. 1 and fig. 2). you should do your utmost to keep the password secure. the encrypted value that is again com- Notice also the inclusion of a variable called “Salt”. A salt is used when gen- A first pass may be to encrypt the pass- pared before access is granted to the erating an encrypted value to make word using the built-in encryption system. the value more unique. When storing “user ” or algorithm provided in In fact, it is possible to enhance this the passwords in the database, O4W your MultiValue database. Then, when scheme so that it provides additional combines the clear-text value and the validating the user during the logon protection against anyone trying to salt (uniquely generated for each O4W process, rather than comparing the “spoof” your system — for example, site), so that even the same password text they have typed in with the clear someone intercepting the encrypted will generate different encrypted val- text password stored in your data files, password and then transmitting that to your application must first encrypt Continues on page 22 the text that the user has typed with the same algorithm, and then com- pare the encrypted value with the en- crypted password stored in your data files. Your application will have the same level of authorization security as before, but now the data stored in the system is useless to others.

Securing Browser Access An additional complication arises if the application is available over the Inter- net via a web browser. It is possible for the data sent from the browser to the host to be intercepted and interpret- Fig. 1 Generating the form ed, and thus any passwords could be comprised. One solution is to use the “https” protocol, which encrypts all the data traveling between the browser and the web server, but this introduces a performance penalty, and if the only “secure” data is the password, it may be overkill. An alternative (in those instances that don’t require full “https” security) is to encrypt the password in the browser before sending it across to the web server. In this way, the “” password is never transmitted, and thus cannot be intercepted; the encrypted value is stored in the database, and it is Fig. 2 Behind the scenes: Encryption “event” on button INTERNATIONAL SPECTRUM March/April 2011 u 21 First Steps To Securing Your Information In The Internet Age Continued from page 21 ues on different systems. The salt, in combination with the date and time, are combined with the clear-text user entered password, which are then all sent back to the server in a single hash value. The host, when receiving the encrypt- ed values, validates that the date and time are within acceptable limits (five minutes, in our example), and then combines the date, time, and previous- Fig. 3 Retrieve and “sanity check” passed in values ly stored encrypted value, to make its own hash. If the hash passed in from the browser matches the hash generat- ed from the data on the server, the user is validated and authorized to continue (fig. 3 and fig. 4)

Don’t Compromise The Security You’ve Built

O4W uses a standard encryption algo- Fig. 4 Behind the scenes: Generate hash in authorization routine rithm (sha1), though different imple-

22 u intl-spectrum.com mentations may use different algo- rithms. However, it is critical that the Ramp up to full compliance with PRC! algorithm used be ‘strong’ — resistant to attempts to crack it. Do not attempt 1001110000111000011100101001 to create your own encryption algo- 1001110000111000011100101001 rithm, or hashing scheme. Unless you racking changes across your software development lifecycle Tcan knock you off course. But you don’t have to sacrifice are a trained cryptographic analyst, it is agility to achieve best practices. unlikely that any “home grown” algo- PRC gives you the speed, visibility and responsiveness rithm will provide strong security. to manage all aspects of software configuration, from service desk through deployment. Productivity leaps If you are planning to implement the when you gain total control. security scheme described above, you And we’ll be right there, jumping through hoops for you! must make sure that the encryption SJ+ Systems Associates • [email protected] • http://sjplus.com algorithm is available to use in the browser as well as on the MultiValue platform. The built-in encryption “user Once the data has been encrypted on password?” option, it also reduces the exit” or algorithm will probably not be your system, as mentioned above, it risk that undesirable third parties can available; instead, you may be able to is impossible to recover a “lost pass- get access to your users’ data — which implement one of the MD5-based algo- word.” Your application should be de- is the biggest inconvenience of them rithms in your MultiValue application, signed to allow for an administrative all. IS and include a comparable javascript override, if applicable, or the ability to function to perform the encryption generate a new random (temporary) in the browser (O4W uses the same password for the end user. javascript library from within Open- Insight as it includes in the browser, While encrypting your data might guaranteeing that the calculation will eliminate the possibility of the conve- be identical). nient, old-fashioned “Email your lost

INTERNATIONAL SPECTRUM March/April 2011 u 23 DesignUser Interface De Facto Standards and Unicorns

By Susan Joslyn

How many software en- ish backwaters. As lovely as our vision gineers does it take to What the software does and of organically grown graphics may be, Q: change a light-bulb? how it does it can increasingly it is probably better to have a plan. But like any of the other things that we A: None. They just change the standard be separated from how it know we could improve, taking time to darkness. looks. A different look and out to develop and document standards It’s easy to change the standards. That’s feel can be dropped over an takes precious time away from actually because few companies actually have developing the applications and using existing application without any kind of documented standards in them in business. This is compounded any area, least of all around the user in- affecting the nature of the by the frustration of documenting stan- terface. Paradoxically, this area where application itself. dards just in time for them to be made you will find the least definition in stan- obsolete by some flashy new front dards is the highest profile. It’s where fraud. There isn’t much of a safety issue end. the user meets the machine, what the in the user interface of a typical busi- This is where the latest generation software looks like, how it behaves at ness application. You can’t even get of graphical user interfaces is going the most quintessential level. Yet we a paper cut from a bad user interface! to take us to the next level. What the tend to let it grow wild, like a patch of What we are probably looking for in software does and how it does it can weeds. A lot of companies are search- user interface standards is uniformity increasingly be separated from how it ing for that perfect face lift — some — “User Interface uniformity.” And looks (fig. 1). A different look and feel sleek new graphical interface that is go- yet, understandably we are motivated can be dropped over an existing ap- ing to bring a smoothly polished, con- to avoid the sameness with other ap- plication without affecting the nature sistent, and professional feel to their plications. We want our software to of the application itself. A decade or software. But we expect it to happen have our creative signature. Plus, the so ago when the term “business rules” organically. Plant the new interface, reality is that most companies have a sprang into use it was meant to con- add water, and we will find ourselves conglomeration of different purchased vey the separation between what the in a neatly ordered world filled with de and home-grown applications along software did and how the software facto standards and, just as likely, pop- with those that have been acquired ulated with lovely white unicorns! via company mergers and acquisitions De facto standards — isn’t that an oxy- along the way. If you could document moron? What do we mean when we hard and fast rules about how the soft- talk about standards? Sometimes we ware should look — even if the target use the word standard to talk about a weren’t constantly moving — how bare minimum. An item is “standard” as would you go about getting all of the opposed to “premium” or “upgraded”. different programs to comply with it? Sometimes it is an inclusion word — We’ve been getting away with follow- this car comes “standard” with cruise ing the leaders and flowing with the control and tinted windows. Stan- current. In reality, that natural flow of dards are often associated with regu- currents doesn’t wind through green lations imposed by some governing hillsides of frolicking unicorns. Rather, body. That will usually happen when we find ourselves in eddies and brack- there are safety issues or potential for Fig. 1 24 u intl-spectrum.com looked. Now we are moving to the looking for guidance on UI standards, wrong following the advice offered in next layer with this new term “lookless be prepared to read a lot of opinions figure 2? controls.” We can define not only the and find very little consensus. Still, business rules, but the interface rules. there is excellent food for thought out Guideline 1.1 The “controls.” Maybe they are “logic there. Blogs where people have taken Follow and apply good user interface controls.” The actual interface can be the time to document their own expe- design principles: user in control, slid over those like a slipcover. This riences — successes and failures — can directness, consistency, forgiveness, idea of lookless controls is going to be save you some time. There are books feedback, aesthetics, and simplicity. the game-changer for user interfaces. that offer guidance from every angle — Fig. 2 Guidelines from Eclipsepedia We can create a corporate skin that we psychological, artistic, functional, and The best exercise may be to start with put over purchased and homegrown statistical. The wiki on Eclipse user in- your current application — green applications alike. We can even give terface standards offers some excellent users choices for their own skins, and high level guidelines. How can you go Continues on page 27 — here’s the important part — build- ing a design standard at that middle layer will enable us to adapt to upcom- ing interfaces, like mobile phones and, “The dashboard shows the top five troubled accounts well, golf bags, vending machines, and and we have them (sales people) being active with turning those coffee makers. We form a layer of stan- accounts around. dardization that comes between what It’s information that wouldn’t be readily available without MITS.” our application does and how it com- municates with the human. Dan Hibbert, VP If we harken back we can remember Hibbert International when the global acceptance of open standards for communications be- tween computers revolutionized the way we work and play. Take e-mail for ® example. In the early days, e-mail was MITS Discover only available between similar servers and applications. So one could only e- When You Need Real Analytics mail to and from the same application One thing is certain, success in over a specific communication proto- business requires adaptation. New col. As soon as communication stan- markets. New processes. New dards were published and adopted, levels of demand for the products suddenly anyone could connect to any- and services that your organization provides. The constant need to do one — regardless of what was sending more with less. the message and what was receiving it. E-mail, EDI, XML, SOA (service orient- Nimble organizations know that to successfully adapt, they must be able ed architecture). The list goes on and to measure results. Results from on, all dealing with computer-to-com- changing markets. Results from puter interfaces. Computer-user inter- smaller staff. Results from fewer face standards have lagged behind. So customers. Results that can make it is this latest abstraction layer — this the difference between success and failure. ability to separate the most superficial components of look/style from the MITS Discover turns the raw data in user interface — that will enable us to your organization into meaningful information, and presents it intuitively, develop meaningful standards for that so the whole team is on the same interaction. Standards that will allow us page. to move more quickly rather than hold- ing us back.

It is still a lot of work. Even trying to Visit MITS today at www.mits.com work out what you need to work out is or contact us at 888 700 6487 ©2011 Management Information Tools, Inc. All rights reserved. a workout. But you may be convinced that the time has come. If you go out INTERNATIONAL SPECTRUM March/April 2011 u 25 Sending Email from your can then move the e-mail from the easy in this regard, since you can just Multivalue programs – \tempmail folder to the \pickup folder. use the EXECUTE statement to process Part 2 – using IIS You can do this easily with the follow- a native Windows command. Continued from page 13 ing command-line process: Take a look at figure 2 for an example c:\inetpub\mailroot\pickup program of how I’ve done this. The move c:\inetpub\mailroot\ As easy as that sounds, there is one pickup\tempmail\testemail. program was written in D3/NT, so you catch. If you write directly to the fold- eml c:\inetpub\mailroot\ will have to look at your MultiValue pickup\ /Y er, and the e-mail is large, you may find system's documentation to see how to the SMTP server trying to process the Again, doing this can be easy or hard do this using other systems. depending on if you are on the same e-mail before you are ready. So instead The key things you will need to re- machine as the SMTP service. The Win- of writing the e-mail directly to that place are how the directory file pointer folder, write it to a temp folder. You dows-based MultiValue systems have it Continues on page 29

SUBROUTINE SEND.EMAIL(TO.ADDR,FROM.ADDR,SUBJECT,MSG) EQU AM TO CHAR(254), VM TO CHAR(253), SVM TO CHAR(252) * OPEN “EMAIL.PICKUP” TO EMAIL.PICKUP.FILE ELSE *** Can not open file, then create the file pointer *** in Master Dictionary. * Q.ITEM = “Q” Q.ITEM<3> = “DOS:c:\inetpub\mailroot\pickup\tempmail\” OPEN “MD” TO MD.FILE ELSE STOP 201, “MD” WRITE Q.ITEM ON MD.FILE, “EMAIL.PICKUP” * *** Try opening the file again. * OPEN “EMAIL.PICKUP” TO EMAIL.PICKUP.FILE ELSE STOP 201, “EMAIL.PICKUP” END * EMAIL.DATE = OCONV(DATE(),”DWA”)[1,3] EMAIL.DATE = EMAIL.DATE :”, “: OCONV(DATE(),””) EMAIL.DATE = EMAIL.DATE :” “: OCONV(DATE(),”DMA”)[1,3] EMAIL.DATE = EMAIL.DATE :” “: OCONV(DATE(),”DY”) EMAIL.DATE = EMAIL.DATE :” “: OCONV(TIME(),”MT”) EMAIL.DATE = EMAIL.DATE :” MST” * EMAIL.ITEM = “” EMAIL.ITEM<1> = “To: “: TO.ADDR EMAIL.ITEM<2> = “From: “: FROM.ADDR EMAIL.ITEM<3> = “Subject: “: SUBJECT EMAIL.ITEM<4> = “Date: “: EMAIL.DATE EMAIL.ITEM<5> = “MIME-Version: 1.0” EMAIL.ITEM<6> = “Context-Type: text/plain” EMAIL.ITEM<7> = “Context-Transfer-Encoding: 7bit” EMAIL.ITEM<8> = “” EMAIL.ITEM<9> = MSG * EMAIL.ID = DATE():TIME():”.eml” WRITE EMAIL.ITEM ON EMAIL.PICKUP.FILE, EMAIL.ID * MOVE.CMD “move c:\inetpub\mailroot\pickup\tempmail\”: EMAIL.ID :” “ MOVE.CMD = MOVE.CMD :” c:\inetpub\mailroot\pickup\ /Y “ EXECUTE \!\: MOVE.CMD RETURN END Fig. 2 26 u intl-spectrum.com User Interface Design How are forms shaped? Aligned? Do Clif Notes: They’re Every- De Facto Standards and you use interior boxes? White ? where! (Well, Not Quite Unicorns On small devices you may want to get Yet) Continued from page 25 away from people entering an answer Continued from page 31 and rather to let them choose one of screen or whatever it is — and think several choices. How will those choic- some by choice. So paper is still a fact about developing standards with two es be presented? of life. Still, the advantages of digital interfaces in mind. In addition to cannot be ignored. the general guidelines mentioned on Reports — First decide what qualifies Eclipsepedia, here are a few things to as a report. Are reports even necessary So as of the last issue, you will note that keep in mind as you get started. anymore? Is a dashboard or graphical each article in the magazine has a QR representation going to be the output code that links you to the online ver- yy Make the standards simple, practi- of choice instead? To keep from junk- sion of that article. See an article that cal and implementable. ing everything up with a lot of different you want to read on the train during yy Make it easy for a developer to find things, some early decisions should be the commute home? Scan the QR code the particular standard or guidance made about when each form of “infor- and bookmark it. Leave the magazine that he or she needs. mational output” would be best used. at the office. Frankly, we are experi- Guidelines about context or the type menting, so watch for other uses as we yy Make each standard/definition an of information and in what format it test the waters. entity that can be mapped across should be presented. Then get into the Some of our advertisers have started multiple UI’s. standards about how each will look, including QR codes in their ads. They including traditional reports. yy Make sure it is intuitive. If you aren’t can provide you with more detailed sure, borrow someone’s seven year Documentation — Let’s face it, in the product information or demonstration old and see if they can figure it out. new age of user interface, people are videos. It’s kind of a hybrid., sort of a As in all insurmountable tasks, it will not going to spend much time with paper hyperlink. their face in a book. We want the an- help to break it down. Four main com- We are also using them at this year’s swer to the question we are facing ponents to start with are: Navigation, conference. Since I am writing this right now. We want it quickly, and we Forms, Reports, and Documentation. in advance of the conference, I don’t don’t want to have to move very far. They cross-apply to one another, too, want to go into any details and spoil So documentation almost disappears. but you have to start somewhere. Error the surprise. But for those of you who In its place well designed help and er- messages and help messages fall under aren’t able to join us, we will let you ror messages will be the wave of the documentation in this broad categori- know what you missed in our Recap future. To be successful, these must zation. Some people might argue that article in the next issue. they deserve their own category and convey a lot of information in a small should be addressed first! amount of space with few words. Es- So what are QR codes used for? That is tablishing some standards for how that primarily limited by your imagination. Navigation — How do you get into will be accomplished is arguably the Sometimes at the various evening func- the application and then move around most important aspect of designing a tions at the conference, such as the within it? Switchboards, drop down modern user interface. Sneak Peek evening, some form of en- menus, command buttons on forms? tertainment is available, like a magician Oh — and don’t forget to add the uni- Do you make one choice at a time or specializing in close-up sleight-of-hand. corns. is are many options presented at once? I offered one of my own suggestions for How does that translate to the appli- Susan Joslyn is the President of SJ+ this year’s conference. Unfortunately, cation running on the green screen? the management of both International Systems Associates, Inc. and is the author How about on your phone or mobile Spectrum and the hotel were in agree- device? of PRC?, a complete, integrated software ment that an event having a no-host Forms — How are the forms laid out? development life-cycle management / IT bar, QR codes, and a tattoo artist was a How is navigation handled within the Governance tool for U2. She has worked bad combination. IS form? Borders, fonts, and colors might with U2 (nee Pick/Multivalue) and SB+ be something that you later allow to be changed as a skin. In fact, it may be a software the beginning (both hers and its) good idea to decide in advance which and has specialized in IT Governance, in- aspects you do plan to be skin-change- cluding quality, compliance and life-cycle able. Think about the “hardware.” productivity issues since the early 1990’s. INTERNATIONAL SPECTRUM March/April 2011 u 27 • MultiValue Command Pocket Guide

It’s All Here! Stay connected to your MultiValue Community, Technical Resources, and Developer information

• MultiValue Command Pocket Guide • Training • Technical Resources • Webinars • User Group Meeting Information • News and Articles

Facebook: intl-spectrum.com/facebook RSS: intl-spectrum.com/RSS Twitter: twitter.com/intlspectrum WEB: intl-spectrum.com Mobile: m.intl-spectrum.com Sending Email from your Business Tech: User Owner- It is also useful to remember that if Multivalue programs – ship of Data Accounting owns the accounting data Part 2 – using IIS Continued from page 11 and Sales owns the sales data, getting Continued from page 26 it right is to their credit. If IT helps reasonableness of the data. We can’t do them get it right, while still respecting works, and how to execute a Windows the best job without them. Likewise, that they are in charge, that brings us command. we can’t abandon the data to them and credit. is expect success. Drawbacks to IIS Got a topic you’d like to see in Busi- The main drawback to using IIS is that Jack Sprat Could Eat No ness Tech? Send it to “Results@Key- you have to have access to the Win- Flack Ally.com” dows machine to be able to write its Another reason for user ownership of directories. This may create a security data is, frankly, blame. When IT owns CHARLES BAROUCH concern in your enterprise. the data, we are at fault when it is wrong. We don’t generally have the au- is the CTO for Key Ally, The other issue with using IIS is that thority to change it, but we have the re- once it’s running, anything that gets Inc. He is past Presi- sponsibility and, therefore, the blame. dropped into that folder will be sent dent of the Internation- When users own their own data, we as an e-mail, and you won’t have any might share responsibility or they may al U2 Users Group, and a regular Spectrum control over it. There is no logon pro- own it in total. Magazine contributor. cess to verify you can send the e-mail through your servers, so if a malware In one of my past lives, I was a co-man- Contact Charles at [email protected], program or user find out that this serv- ager for Wenco, a Wendy’s franchisee. er exists, then you have a very large se- Part of the management philosophy or phone (718) 762-3884 ext 1. curity concern. there was “You don’t give the R with- out the A.” In other words, Responsi- The next article I will talk about how bility and Authority belong together. to send an e-mail using Linux SEND- MAIL. is

• Quick and easy to install • High quality documentation and online help • Close compatibility with most other Open multivalue environments • Maintenance-free file system for ease of use • QMClient API for development of VB, C and M web-based applications • Very low licensing costs taking multivalue … • No mandatory support contracts where it has never been before • AccuTerm bundled at no additional cost

Ladybridge Systems Ltd 17b Coldstream Lane, Hardingstone, Northampton, NN4 6DB, England www.ladybridge.com US Main Distributor: EasyCo, 220 Stanford Drive, Wallingford PA, 19086 USA www.easyco.com www.openqm.com

INTERNATIONAL SPECTRUM March/April 2011 u 29 Backups Take Too Long? Need 24/7 Productivity?

y No more corrupt database back-ups y No need to log off users to back-up y No need to break disk mirrors y No need for a redundant or three-way mirror y Improved database back-up processes y Improved data retrieval procedures

Backups are crucial.

FastBac DR improves...

In today’s fast-paced business environment current, fast backups are crucial. FastBac DR improves system availability to enable your site to work 24/7, and still stay secure in your backups and disaster recovery.

System available, productive and protected 24/7

www.ashwoodcomputer.com

10671 Techwood Circle, Suite B / Cincinnati, Ohio 45242 Phone: 513.563.2800 / Fax: 513.544.6412 E-mail: [email protected] They’re Everywhere! (Well, Not Quite Yet) Clif see QR codes. course, the box is empty. Take a close Notes look at the For Sale sign. Some real But unlike the ghosts of dead people, these things are estate agents are now printing a QR I present in our external reality. And I’m not alone. Lots code on it. Scan it with your phone, of people see them, including the attendees at the 2011 In- and the next thing you know, you are looking at all the listing ternational Spectrum conference. You see them too. Look up info for the dream house you are standing in front of. at the top of this page. See that square checkerboard thing? That’s a QR code. Calvin Klein once put a large QR code on a billboard. When folks would scan it with their phone, it would launch an ad- The QR “Quick Response” code is a bar code that allows you vertisement that was, shall we say, “spicy.” (I bet some of the to store text messages, web site URLs, contact vCards, and implications of this kind of use has some attorneys salivating.) other things in a form that can be easily scanned and acted on But it gets better. by a QR code reader. Such scanning software is readily avail- able for smartphones. In some regions, McDonald’s uses QR codes on its product packaging so people can link to nutritional information about Developed by the Denso-Wave subsidiary of the Toyota Cor- the product they are ingesting. I find it ironic, however, that poration in 1994, they have become very popular in Japan. Of you have to buy the product in order to get the packaging course, anything having to do with a mobile phone is always that has the QR code that gives you the information so that a big hit in Japan, including little electric wheels and leashes you can determine whether or not you want to buy the prod- so you can walk them next to you like a pet. (Okay, I’m exag- uct. gerating. The pets are simply apps that you have to care for or they die.) They are just starting to take hold in other countries, And in Japan, some people are putting QR codes on tombs. including the United States. If you don’t know what they are, (What did I tell you?) Scan it with your phone and get infor- you tend to look right over them without even noticing. But mation about the deceased. as their use increases, you will begin to see them popping up There you have it. QR codes really can help you see dead all over the place. So, you might ask, what good are they? people. Not a darn thing. Until recently, the discussion of QR codes and smart phones That is, not in and of themselves. But people are beginning have been closely tied together. Enter the tablet. to find some interesting uses for them. For example, Google One of the problems with digital publishing is that you either sends out window decals to businesses identified as a Favor- needed a notebook/netbook computer or a dedicated e-book ite Place. On the decal was a QR code that would link to the reader to take advantage of it in anything other than prose business’s page where you can read or write reviews, be in- form. I mean, you might read a novel on your phone using formed of special promotions available to them, or mark the your Kindle app (I do), but if we publish a 50 line code ex- business as a Favorite. ample, are you really going to try to read that with that tiny You can include your contact information in vCard format screen on your phone? Not likely. PDF format works for some on your business card. Scan the code and your contact infor- people, and they even prefer it. That is one of the reasons mation is automatically added to the reader’s address book. why International Spectrum magazine is available for down- Or use it to store a web site address that takes them to your load in PDF format. But again, until recently, you needed a product catalog or a product demo on YouTube. notebook or desktop computer to read it. You may be planning on buying a house. One day while you’re But the advent of the tablet changes that. Of course, tablets out driving around, and you spot the absolutely perfect place are not as wide spread as phones. And a lot of readers don’t with a For Sale sign in front of it. Underneath the For Sale have smart phones, some because of the cost of digital plans, sign there is a box meant for information brochures about Continues on page 27 the property, a few interior pictures, and who to contact. Of INTERNATIONAL SPECTRUM March/April 2011 u 31 Virtual Conference 2011

From application development and technical systems Unable to join us in person? support to complex business and web development, we offer complete IT solutions. Need to talk with a vendor again? International Spectrum Conference is the only place that Missed a session at provides diverse solutions and support for integrating and Spectrum Live? developing your Enterprise applications into the world of business and technology. Spectrum 2011 Virtual: This annual event is the place to find the knowledge, people, • Live Chat resources, and technologies for enhancing your MultiValue • Downloads (D3, UniVerse, UniData, Reality, jBase, Cache, QM, and • On-Demand Recordings OpenInsight) software package. • Social Media • Networking

Register Now! April 12 – 14, 2011

intl-spectrum.com/virtual/2011