Interbase Software Corporation
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Embrace and Extend Approach (Red Hat, Novell)
Integrated Development Environments (IDEs) Technology Strategy Chad Heaton Alice Park Charles Zedlewski Table of Contents Market Segmentation.............................................................................................................. 4 When Does the IDE Market Tip? ........................................................................................... 6 Microsoft & IDEs ................................................................................................................... 7 Where is MSFT vulnerable?................................................................................................. 11 Eclipse & Making Money in Open Source........................................................................... 12 Eclipse and the Free Rider Problem ..................................................................................... 20 Making Money in an Eclipse World?................................................................................... 14 Eclipse vs. Microsoft: Handicapping the Current IDE Environment ................................... 16 Requirements for Eclipse success......................................................................................... 18 2 Overview of the Integrated Development Environment (IDE) Market An Integrated Development Environment (IDE) is a programming environment typically consisting of a code editor, a compiler, a debugger, and a graphical user interface (GUI) builder. The IDE may be a standalone application or may be included as part of one or more existing -
VERSION 2.0 Referene MANUAL
VERSION 2.0 REFERENe MANUAL BORlAnD INTERNATIONAL Borland International 4113 Scotts Valley Drive Scotts Valley, California 95066 Copyright Notice© This software package and manual are copyrighted 1983, 1984 by BORLAND INTERNATIONAL Inc. All rights reserved worldwide. No part of this publication may be reproduced, transmitted, transcribed, stored in any retrieval system, or translated into any language by any means without the express written per mission of BORLAND INTERNATIONAL Inc., 4113 Scotts Valley Drive, Scotts Valley, CA 95066, USA. Single CPU License The price paid for one copy of TURBO Pascal licenses you to use the product on one CPU when and only when you have signed and returned the License Agreement printed in this book. Disclaimer Borland International makes no warranties as to the contents of this manual and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Borland International further reserves the right to make changes to the specifications of the program and contents of the manual without obligation to notify any person or organization of such changes. Fifth edition, October 1984 Printed in the United States of America 98765 TABLE OF CONTENTS INTRODUCTION ............................................. 1 The Pascal Language .........................................1 TURBO Pascal ..............................................1 Structure of This Manual ..................................... 2 Typography ............................................... 3 Syntax Descriptions -
Firebird 3.0 Developer's Guide
Firebird 3.0 Developer’s Guide Denis Simonov Version 1.1, 27 June 2020 Preface Author of the written material and creator of the sample project on five development platforms, originally as a series of magazine articles: Denis Simonov Translation of original Russian text to English: Dmitry Borodin (MegaTranslations Ltd) Editor of the translated text: Helen Borrie Copyright © 2017-2020 Firebird Project and all contributing authors, under the Public Documentation License Version 1.0. Please refer to the License Notice in the Appendix This volume consists of chapters that walk through the development of a simple application for several language platforms, notably Delphi, Microsoft Entity Framework and MVC.NET (“Model-View-Controller”) for web applications, PHP and Java with the Spring framework. It is hoped that the work will grow in time, with contributions from authors using other stacks with Firebird. 1 Table of Contents Table of Contents 1. About the Firebird Developer’s Guide: for Firebird 3.0 . 6 1.1. About the Author . 6 1.1.1. Translation… . 6 1.1.2. … and More Translation . 6 1.2. Acknowledgments . 6 2. The examples.fdb Database . 8 2.1. Database Creation Script. 8 2.1.1. Database Aliases . 9 2.2. Creating the Database Objects. 10 2.2.1. Domains . 10 2.2.2. Primary Tables. 11 2.2.3. Secondary Tables . 13 2.2.4. Stored Procedures. 17 2.2.5. Roles and Privileges for Users . 25 2.3. Saving and Running the Script . 26 2.4. Loading Test Data . 27 3. Developing Firebird Applications in Delphi . 28 3.1. -
Adapting MSP to Microsoft C++ ©James T. Smith, 1999 1. Introduction A. General Comments I. Purpose
Adapting MSP to Microsoft C++ ©James T. Smith, 1999 1. Introduction a. General comments i. Purpose (1) MSP was developed in a PC environment with the original version of Borland C++, then adapted in several stages to Version 5.0, the standard for this book. Many readers, however, prefer to or must use a different compiler. The environment most frequently mentioned that is somewhat close to the book’s is Microsoft’s. This file describes my adaptation of MSP as a suite of Microsoft Visual C++ Win32 Console Applications. (2) It’s an adaptation guide, not a completed product. Most MSP features described in this book work under the adaptation, but it has not been used for further development. With it, you can see how these features work in your Microsoft environment. To use it for a major project, however, you’ll probably want to select only the appropriate MSP modules. You’ll need to test the adaptation much more thoroughly, and probably add minor cor- rections as needed by your specific application. ii. Major differences (1) Microsoft’s complex mathematics module is implemented with templates. That adds more levels of implicit conversions for the compiler to consider when resolving overloaded function declarations. Many more ambiguities would result, and some methods MSP uses to resolve them would no longer work. This would cause so many changes that you’d lose sight of the rest. So the adaptation contains a completely rewritten complex module. (2) Microsoft handles hardware faults, such as overflow detected by the floating-point processor, by throwing“structured exceptions”. -
Language Reference
InterBase 6 Language Reference Borland/INPRISE 100 Enterprise Way, Scotts Valley, CA 95066 http://www.interbase.com Inprise/Borland may have patents and/or pending patent applications covering subject matter in this document. The furnishing of this document does not convey any license to these patents. Copyright 1999 Inprise/Borland. All rights reserved. All InterBase products are trademarks or registered trademarks of Inprise/Borland. All Borland products are trademarks or registered trademarks of Inprise/Borland. Other brand and product names are trademarks or registered trademarks of their respective holders. 1INT0055WW21004 6E1R0699 Table of Contents List of Tables.....................................xi CHAPTER 1 Using the InterBase Language Reference Who should use this book .....................13 Topics covered in this book .....................14 CHAPTER 2 SQL Statement and Function Reference Database object naming conventions ...............16 Statement list .............................17 Function list .............................18 Datatypes ...............................19 Error handling ............................20 Using statement and function definitions .............21 ALTER DATABASE ..........................22 ALTER DOMAIN ...........................23 ALTER EXCEPTION .........................25 ALTER INDEX ............................26 ALTER PROCEDURE .........................27 ALTER TABLE .............................28 ALTER TRIGGER ...........................35 AVG( ) .................................36 BASED -
Development of Cross-Platform Problem-Oriented Systems Using Specifications of Database Applications ?
Development of cross-platform problem-oriented systems using specifications of database applications ? Alexei Hmelnov1;2[0000−0002−0125−1130] and Evgeny Fereferov1;2[0000−0002−7316−444X] 1 Matrosov Institute for System Dynamics and Control Theory of Siberian Branch of Russian Academy of Sciences, 134 Lermontov st. Irkutsk, Russia [email protected] http://idstu.irk.ru 2 Institute of Mathematics, Economics and Informatics, Irkutsk State University, Gagarin Blvd. 20, Irkutsk, Russia Abstract. We consider the approach to development of AIS (automated information system) using declarative specifications of database applica- tions (SDA). The specifications of database applications contain all the information about database structure, which is required to build a typical AIS. The information is represented in its pure form, so the specifications are rather concise. The AIS'es are implemented using general algorithms, which are directed by the specifications. We have developed algorithms for such tasks as: user interface generation, query building, report gener- ation, GIS interaction. Using the specifications of database applications and the algorithms the software system GeoARM was implemented. The technology considered was well-tried by use of the system GeoARM for development of several dozens of true-life AIS for different purposes. In this article we'll describe the approach, that we use for creation of several versions of the GeoARM engine, which use different data access libraries, from the common source code base. The resulting versions of the GeoARM engine allow us to create problem-oriented AIS'es for all the supported platforms from the single SDA. Keywords: Specifications of database applications · automated infor- mation systems · rapid application development · data access technology · source code structuring. -
AIM104-Software Library
2192-09193-000-000 AIM104-Software Library Software A Utility Disk is supplied with your AIM104. It contains a host of software utilities designed specifically for each AIM104. Please refer to the README.TXT file on the disk for further information. It also includes a test program EXAMP-01.EXE which may be used to confirm access to the board. Introduction Arcom Control Systems produces a complete range of high quality Input/Output (I/O) cards for the PC104 bus. In order to support these I/O cards as fully as possible a complimentary set of high quality software support products is also available. This software library forms part of the software support. This software support has been developed to support Borland C++ versions 3.1 and 4.52, running on 386 CPUs, Pentium CPUs and Arcom Target boards, in both DOS and Windows operating systems. It is presented to the user in the form of standard static library files. This library can then be incorporated into custom application code giving the user all the software facilities needed to use all the hardware features included on an Arcom PC104 I/O card. This manual contains the basic details of what is contained within this library. For a more detailed description please read the Word 2.0 file genman.doc contained in the DOCS sub-directory of the installation disk or in the DOCS sub-directory of the directory you install to. The list below shows the boards supported within the scope of this library. All commonly used modules are listed, however those that fall outside this list are not supported within this software library. -
Lotus V. Borland: Defining the Limits of Software Copyright Protection Jason A
Santa Clara High Technology Law Journal Volume 12 | Issue 1 Article 7 January 1996 Lotus v. Borland: Defining the Limits of Software Copyright Protection Jason A. Whong Andrew T. S. Lee Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Jason A. Whong and Andrew T. S. Lee, Lotus v. Borland: Defining the Limits of Software Copyright Protection, 12 Santa Clara High Tech. L.J. 207 (1996). Available at: http://digitalcommons.law.scu.edu/chtlj/vol12/iss1/7 This Case Note is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. CASENOTE LOTUS V. BORLAND: DEFINING THE LIMITS OF SOFTWARE COPYRIGHT PROTECTION Lotus Development Corporationv. BorlandInternational, Inc., 49 F.3d 807 (1st Cir. 1995)* Jason A. Whongt and Andrew T.S. Leet TABLE OF CONTENTS INTRODUCTION .............................................. 207 BACKGROUND .............................................. 209 D ISCUSSION ................................................ 211 A. Method of Operation ................................ 211 B. Computer Associates International,Inc. v. Altai, Inc... 215 CONCLUSION ................................................ 216 "[E]verything ... has been done already ... who are we to improve upon them? We can only attempt, respectfally, to repeat."' INTRODUCTION On January 16, 1996, only eight days after hearing oral argu- ments in the case, an equally divided2 Supreme Court let stand the First Circuit's decision in Lotus Development Corp. v. Borland Inter- * Copyright @ 1995 Jason A. Whong and Andrew T.S. -
Appendix 1 the Borland Pascal Package
Section 1. Installation 555 Appendix 1 The Borland Pascal Package Section 1. Installation When you open your carton of Borland Pascal, you may be frightened by the tens of kilos of books and mountain of disks. This Appendix will get you started on installation and use of the system to write your Pascal programs. Even if you have already installed Borland Pascal and are using it, you may find some useful tips here, so please thumb through these pages. (There is much useful information in the Borland Pascal User's Guide, which is in your package.) For starters, your computer should have a goodly chunk of free disk space in one hard disk partition. If you install the complete Borland Pascal system, that will take about 30M. The programs with this book will fill about 2M, and when you start writing programs, who knows? Before you start installation, decide which partition to use, and note how much free disk space is available. Don't push a partition to its absolute limit. Start the "Install" program by inserting Disk 1 into the A: drive and typing A:INSTALL <Enter> (By the time this book appears you will probably be able to acquire BP on CD ROM and install it that way.) The "Install" program gives you lots of options, and explains what it is doing as it runs. If you have adequate disk space, the easiest course is to install everything. If you want to install only what you need for using this book, when the "Install" program prompts you for what to install/omit, you can omit the Windows version, the Assembler, the Profiler, the Debugger, the Turbo Vision package, and the On-line compilers. -
An Overview of the Usage of Default Passwords (Extended Version)
An Overview of the Usage of Default Passwords (extended version) Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, and Ibrahim Baggili Cyber Forensics Research and Education Group (UNHcFREG) Tagliatela College of Engineering University of New Haven, West Haven CT, 06516, United States fbknie1, [email protected],fXZhang, FBreitinger, [email protected] Summary. The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem in 2017. In this study we investigated several common applications and their pass- word policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). In order to understand the developer decision to implement default passwords, we raised this question on many online platforms or contacted professionals. Default passwords are still a significant problem. 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 char- acter. Key words: Default passwords, applications, usage, security 1 Introduction Security is often disregarded or perceived as optional to the average consumer which can be a drawback. For instance, in October 2016 a large section of the In- ternet came under attack. This attack was perpetuated by approximately 100,000 Internet of Things (IoT) appliances, refrigerators, and microwaves which were compromised and formed the Mirai botnet. Targets of this attack included Twit- ter, reddit and The New York Times all of which shut down for hours. -
Ibsurgeon Interbase/Firebird Database Information Tool
IBSurgeon Free Tools: User Guide © IBSurgeon, 2015, www.ib-aid.com IBSurgeon Free Tools: User Guide IBSurgeon Free Tools is a set of 3 tools for Firebird and InterBase administrators and developers, designed to facilitate several typical tasks: 1) measure response time of specific SQL query to find time when query runs slower than usual (“Response Checker”), 2) view how much data, indices, blobs, etc, are stored in your Firebird or InterBase database (“DBInfo”) 3) investigate Firebird log for errors and warnings, (“Log Viewer”) These tools are simple to use, below you can find their short overview and frequently asked questions. IBSurgeon Response Checker 1. Why do you need Response Checker? If you are trying to improve Firebird database performance, the first thing you need to define is criteria of performance optimization. And, Firebird database performance has such criteria: Average response time Maximum response time Response time should be measured with your real-world application and with your production database (or in test environment which simulates production close enough). There is no reason to measure average response time out of the scope of your real application, until you want some abstract «optimization» - or you are using test environment which is proven to be very close or even identical to your production database. Response time is what your end users will refer as «slow», «very slow» or «good enough» (end users never say that your software is «fast»). How to measure the average and maximum response times in real-world production environments running Firebird? For the basic response time measurement you can use IBSurgeon Response Checker. -
1 in the UNITED STATES DISTRICT COURT for the EASTERN DISTRICT of TEXAS TEXARKANA DIVISION DISC LINK CORPORATION, Plaintiff, V
Case 5:06-cv-00295-DF-CMC Document 255 Filed 07/23/07 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS TEXARKANA DIVISION DISC LINK CORPORATION, ' ' Plaintiff, ' ' ' v. ' CIVIL ACTION NO. 5:06cv00295 ' H&R BLOCK DIGITAL TAX SOLUTIONS, ' JURY TRIAL DEMANDED LLC F/K/A H&R BLOCK DIGITAL TAX ' SOLUTIONS, INC., BLOCK FINANCIAL ' CORPORATION and RIVERDEEP INC., A ' LIMITED LIABILITY COMPANY, ' ' Defendants. ' ' CONSOLIDATED WITH: ' DISC LINK CORPORATION, ' ' Plaintiff, ' CIVIL ACTION NO. 5:07-CV-58 ' v. ' ' ORACLE CORPORATION, SAP ' AMERICA, INC. d/b/a SAP AMERICAS, ' SAP AG, BENTLEY SYSTEMS, INC., ' ' SPSS, INC., SOLIDWORKS ' CORPORATION, CMS PRODUCTS, INC., ' SONIC SOLUTIONS, COREL ' CORPORATION, COREL, INC., MISYS ' INTERNATIONAL BANKING SYSTEMS, ' INC., ADTRAN, INC., EASTMAN KODAK ' COMPANY, CA, INC., UGS CORP., ' NUANCE COMMUNICATIONS, INC., ' KOFAX IMAGE PRODUCTS, INC., ' ' BUSINESS OBJECTS AMERICAS, ' BUSINESS OBJECTS SA, TREND MICRO ' INCORPORATED (CALIFORNIA ' CORPORATION), EMC CORPORATION, ' BORLAND SOFTWARE CORPORATION, ' NOVELL, INC., COMPUWARE ' CORPORATION and ' AVID TECHNOLOGY, INC., ' ' ' Defendants. ' 1 Case 5:06-cv-00295-DF-CMC Document 255 Filed 07/23/07 Page 2 of 10 FOURTH AMENDED COMPLAINT Plaintiff DISC LINK CORPORATION files this Fourth Amended Complaint against Defendants H&R BLOCK DIGITAL TAX SOLUTIONS, LLC, f/k/a H&R BLOCK DIGITAL TAX SOLUTIONS, INC., BLOCK FINANCIAL CORPORATION, RIVERDEEP INC., A LIMITED LIABILITY COMPANY, ORACLE CORPORATION, SAP AMERICA, INC. d/b/a SAP AMERICAS, SAP AG, BENTLEY SYSTEMS, INC., SPSS, INC., SOLIDWORKS CORPORATION, CMS PRODUCTS, INC., SONIC SOLUTIONS, COREL CORPORATION, COREL, INC., MISYS INTERNATIONAL BANKING SYSTEMS, INC., ADTRAN, INC., EASTMAN KODAK COMPANY, CA, INC., UGS CORP., NUANCE COMMUNICATIONS, INC., KOFAX IMAGE PRODUCTS, INC., BUSINESS OBJECTS AMERICAS, BUSINESS OBJECTS SA, TREND MICRO INCORPORATED (CALIFORNIA CORPORATION), EMC CORPORATION, BORLAND SOFTWARE CORPORATION, NOVELL, INC., COMPUWARE CORPORATION and AVID TECHNOLOGY, INC., alleging as follows: I.