|
|
|
|
|
|
|
WDBal, the secure messaging provided with WINDEV, WEBDEV and WINDEV Mobile, allows you to easily read the incoming messages...... |
|
|
|
|
|
|
The IgnoreError property gets and sets the different certificate errors ignored by the HTML Display and WEBDEV Page controls. |
|
|
|
|
|
|
The WBAdminAuth type allows you to define all the advanced characteristics of the API used to remotely manage a WEBDEV Application Server. |
|
|
|
|
|
|
To make your WEBDEV sites accessible to the visually impaired, simply enter specific attributes in the fields ...... |
|
|
|
|
|
|
WINDEV and WEBDEV propose an optional Native Connector to Informix (also called Native Access...... |
|
|
|
|
|
|
Displays a semi-dynamic page in the browser of the Web user from a dynamic or static WEBDEV page. |
|
|
|
|
|
|
The data replication is a powerful feature...... |
|
|
|
|
|
|
WINDEV, WEBDEV and WINDEV Mobile allow you to directly manage the emails from your applications...... |
|
|
|
|
|
|
WINDEV, WEBDEV and WINDEV Mobile have included multilingual project support in many previous versions...... |
|
|
|
|
|
|
WDModFic is a tool used to perform the automatic modification of the data files found on the development computer and on the end-user computers...... |
|
|
|
|
|
|
WINDEV, WEBDEV and WINDEV Mobile allow you to customize the interface of your applications via several preset interfaces...... |
|
|
|
|
|
|
A setup by physical media allows you to give to the hosting company a media containing all the files required to install the site on a server...... |
|
|
|
|
|
|
To transform a page in Session mode into an Active WEBDEV Page:... |
|
|
|
|
|
|
List of events associated with Link controls... |
|
|
|
|
|
|
List of events associated with Clickable Image controls... |
|
|
|
|
|
|
The following functions are used to manage users and connections on a WEBDEV Application Server:... |
|
|
|
|
|
|
WEBDEV Tutorial - User Groupware User login: User Groupware - 20 min |
|
|
|
|
|
|
Secure Shell (SSH) is a secure communication protocol. The exchanged data is secured via encryption keys.... |
|
|
|
|
|
|
The programmed Drag and Drop is used to entirely manage Drag/Drop between the different types of controls...... |
|
|
|
|
|
|
The POP3 and SMTP protocols are protocols for email management recognized by all Internet Service Providers...... |
|
|
|
|
|
|
Many devices can be used to display websites (Android phone, iPhone, etc.... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|