|
|
|
|
|
|
|
The runtime log is the best way to identify the most used features of an application...... |
|
|
|
|
|
|
The different operations that can be performed with WDLog are as follows...... |
|
|
|
|
|
|
This chapter presents the following topics...... |
|
|
|
|
|
|
The Google Maps service is an Internet mapping software proposed by Google...... |
|
|
|
|
|
|
When a control template is applied to a page or to a window, all controls and code found in the template are "copied" into the page or window...... |
|
|
|
|
|
|
When a window template is applied to a window, all the controls and code in the template are "copied" to the window...... |
|
|
|
|
|
|
Ouvre une fenêtre de type popup en précisant sa position d'ouverture et attend sa fermeture.... |
|
|
|
|
|
|
In some cases, it may be useful to execute the same stored procedure multiple times by changing one or more parameters ...... |
|
|
|
|
|
|
This type of Native Connector allows access to ACCESS databases for better interoperability purposes...... |
|
|
|
|
|
|
The hosting parameters define the default values that will be used to create the new hosting accounts...... |
|
|
|
|
|
|
A report provides a custom view of data...... |
|
|
|
|
|
|
A query is used to interrogate a database in order to view, insert, modify or delete data...... |
|
|
|
|
|
|
The stored procedures are used to simplify the development and the maintenance of your applications by factorizing the code...... |
|
|
|
|
|
|
The "Key" items are used to organize the records in a data file in order to optimize the browse or the search...... |
|
|
|
|
|
|
Rolls the transaction back to the savepoint. |
|
|
|
|
|
|
The stored procedures and the triggers are debugged from the environment, with real execution on the server...... |
|
|
|
|
|
|
Declares a transaction savepoint. |
|
|
|
|
|
|
Changes the DNS name of the replication server if it has a new name. |
|
|
|
|
|
|
Required configuration and overview for installing HFSQL Cluster.... |
|
|
|
|
|
|
To create an SSL server with SocketCreateSSL, you must use a signed certificate containing a private key...... |
|
|
|
|
|
|
WINDEV, WEBDEV and WINDEV Mobile propose a sophisticated Source Code Manager...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|