/**

popular collection of scripts for all

*/
/** Search */

Software

 }

TCDesigner

Hits: 326
*****
0.0

Replicator

Hits: 536
*****
0.0

Passage Portal .NET

Hits: 905
*****
0.0
TCDesigner brings class to
The Replicator will copy any
Passage Portal .NET provides
PortSight Secure Access
the chore of creating your
file and is extremely easy
portal and content
allows developers to manage
classes! You'll have
to use! Plenty of options
management features right
users and their access to
TCDesigner's easy
and best of all, it's
out of the box. Highly and
WebForms and WinForms
point-and-click interface
freeware. Copy software or
secure and reliable. Ideal
applications, Web Services,
cranking out excellent
Application, but please do
for extranet or web site
and Web content. It features
performing code in no time.
not make copies of software
portals. Develop portlets
user groups, roles,
Unlike our competitors, no
you do not own. Freeware -
using Visual Studio.NET.
permissions, auditing and
template scripting is
for business and personal use
Source code examples
delegation of
required. The only input is
 
included.
administration. The
your SQL Server database!
 
 
Enterprise Edition also
Also unlike the competition
 
 
integrates with Microsoft
TCDesigner is very
 
 
Active Directory, Windows NT
affordable. You control the
 
 
domains and ODBC.
way TCDesigner names
 
 
 
properties, methods,
 
 
 
namespaces. Compare our
 
 
 
features, the quality of
 
 
 
generated code, and
 
 
 
performance. Because
 
 
 
TCDesigner is an active
 
 
 
generator, you can go back
 
 
 
and forth between TCDesigner
 
 
 
and your favorite editor.
 
 
 
TCDesigner remembers your
 
 
 
project settings. 100%
 
 
 
stored procedures no in-line
 
 
 
SQL. Code performs
 
 
 
excellent. Generated code is
 
 
 
readable and well commented.
 
 
 
Produce high-quality
 
 
 
documentation straight from
 
 
 
the XML comments!
 
 
 


Date: Sep, 30 2004


Date: Sep, 29 2004


Date: Sep, 11 2004


Date: Aug, 30 2004
PortSight Task Scheduler
PortSight Meta Tree 2.0, a
Customers carry a transponder
A number of companies in the
executes long-running and
successful content
that is mounted in a device
security and access control
resource-intensive tasks
management component for
such as a key chain or
industry are incorporating
asynchronously, on the
.NET, was released. Meta
mobile phone. At the
access control into a range
server side, which makes
Tree simplifies building of
point-of-sale, the customer
of perimeter and building
ASP.NET applications more
ASP.NET applications that
waives the transponder at a
security systems, as well as
robust and improves user
organize relational and
RFID reader/antenna that
vehicle and parking access
experience.
unstructured data in
will pick up each
applications. Transponders
 
hierarchical structures. You
transponder's unique
can be mounted on automobile
 
can easily manage data and
identifier signal. The
windshields, contained in
 
metadata using a unified API
reader/antenna will then
employee badges, or carried
 
with functions including
pass that information onto
on key rings. Readers are
 
full-text search,
the appropriate value added
mounted inside walls at
 
multilingual support,
network to verify the
doorways and outdoors
 
management of users, tree
customer's profile and
alongside entranceways to
 
structures and permissions.
credit information. Upon
parking garages and lots.
 
 
authentication, the terminal
The iTAGŪ RFID line of
 
 
processes the transaction,
13.56 MHz badges and
 
 
prints a receipt, and the
readers, brings the access
 
 
customer is on his way.
control market the superior
 
 
 
security, faster transfer
 
 
 
speed, and 2000-bit memory
 
 
 
of the ISO 15693 vicinity
 
 
 
card standard, delivered by
 
 
 
the global leader in RFID
 
 
 
solutions. As a pioneer
 
 
 
in 13.56 MHz technology in
 
 
 
the Philippines who has
 
 
 
built innovative solutions
 
 
 
from retail and logistics
 
 
 
tracking to wireless
 
 
 
payments systems, AC
 
 
 
Corporation is harnessing
 
 
 
this powerful technology for
 
 
 
the security and access
 
 
 
control industry.


Date: Aug, 26 2004


Date: Aug, 26 2004


Date: Aug, 23 2004


Date: Aug, 23 2004
{ Copyright } ©2019 NuclearScripts.com