EZSMS permet d'envoyer facilement des TEXTOS / SMS uniques ou en lots via les services de SMSMODE.COM ou de SMSBOX.FR depuis une application qui intègre ce composant, en gérant les erreurs possibles. ... |
Published on 04/02/2011 Downloaded 40 time(s) |
| |
Example in EN/ENG/ESP of using RegEXP when you need to check inputs other than by the option offered in the Input mask, Input field description window. Can be transcribed to earlier versions of WD. Y... |
Published on 10/08/2020 Downloaded 62 time(s) |
| |
EZPass Component to create Passes (iOS Wallet) Passes (ESPass Android / PKPass iOS) are a digital representation of information that could otherwise be printed on small pieces of paper or plastic. Th... |
Updated on 01/15/2021 Downloaded 20 time(s) |
| |
This component and its example allow to scan a signature from WACOM pads whose type are STU-300 / 4X0 / 5X0, to link it to a document and to be able to check its authenticity regarding this last. The ... |
Updated on 03/30/2020 Downloaded 338 time(s) |
| |
Text and files encryption using the DES / 3DES (Triple DES) protocol EZDES has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on s... |
Updated on 05/02/2014 Downloaded 180 time(s) |
| |
Text and files encryption using the AES – I – II – III protocol EZAES has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on storag... |
Updated on 05/02/2014 Downloaded 285 time(s) |
| |
Text and files encryption using the Anubis I to VII protocol EZANS has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on storage, ... |
Updated on 05/02/2014 Downloaded 122 time(s) |
| |
Text and files encryption using the KHAZAD protocol EZKZD has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on storage, either on... |
Updated on 05/02/2014 Downloaded 120 time(s) |
| |
Text and files encryption using the SERPENT I - II - III protocol EZSPT has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on stor... |
Updated on 05/02/2014 Downloaded 107 time(s) |
| |
Text and files encryption using the TwoFish I - II - III protocol EZTWF has been developed in order to bring a solution for security needs, when protecting sensitive data is mandatory either on stora... |
Updated on 05/02/2014 Downloaded 218 time(s) |
| |