From the Inside: September/October 2016
I've been talking to a lot of people about hiring Millennial developers again. It goes back to the whole "The Millennials are Coming" and "How to Keep Them" questions that we talked about at the 2016 Conference.
When You Hire
It is easy to push off hiring onto the second tier. Bennett Barouch disagrees. He wants to impress upon us the importance of adding new people to your team — the right way.
Business Tech: Finding an Exit
Bennett is covering hiring, so Business Tech is focused on the other side of the equation: the exit. Are your systems and procedures prepared to do things right? Remember, firing isn't the only way that people leave. You need to cover all the methods. If your company has employees, as most companies do, then join us in finding an Exit.
Interview with Paul Giobbi, President, Zumasys Inc.
Zumasys became a database vendor when they acquired jBASE. They are also the worldwide distributor for OpenQM. They work with Rocket Software as a VAR. Here's a chance to hear what Paul Giobbi thinks is next for MultiValue.
IS.HASH.SHA1: Generating SHA1 Values with Generic MultiValue BASIC
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA1 is used in many places to generate a unique Hash value representing a string or file. It is widely used in place of MD4 and MD5 hash because it has a more secure hash value. While not as secure as SHA256, it is still used in many places for data integrity, version control, and other features that need unique one-way signatures.
Building a Modern Line-Of-Business Application: Part 5 - Business API
This is part five in a series which explores what it takes to build a Line-Of-Business application from scratch using the tools and features found in modern software technologies. In this article we begin to connect the parts we discussed in the previous articles.