This method is a simple way to send an email with WebClient. Create a function with these fields: toEmail: Recipient’s email fromEmail: Sender’s email subject: Subject from the email body: Message part from the email attachmentFileLocation(OPTIONAL): path from the file we will send as attachment 2. Add a source code object call “sendEmail” to your function. 3. Add the
Create Rich Tooltips and Popups to Guide Your Users With your application, its important to give your user all the information they need. But, it is also important not to overwhelm them with too much information and clutter. In many Plex applications, this is accomplished with a basic screen that shows only “need to know”
After a long run, IBM i 7.1 coming to an end. IBM i V7R1 is officially end-of-support as of April 30, ending a long life of service. V7R1 was released in April 2010, making it the longest-supported version of IBM i’s operating systems on record. For companies that don’t wish to buy expensive extended support
A growing number of businesses process and leverage massive amounts of personal data every day. Protecting customer data has become an increasingly important and complicated task for IT departments charged with safeguarding it from hackers determined to commit large-scale identity theft. The key is understanding Data Lineage.
Lucio Gayosso, Sr. Consultant/Nearshore Team Lead With complex systems and aging systems, there is an ever-increasing need for automated testing which can be challenging on some CA Plex Systems where the GUI controls have not been modernized. A problem with some automated testing tools is that it is difficult to see some old WinC controls
Displaying blocks of information as an array of protected fields is easy and fast, but, it is not always the most effective way to impart information to your users. Using Custom HTML fields, you can remove unnecessary information, more easily highlight important information for your users, and achieve a better display of static content. As
Improve Your Application’s Mobile Security with Tools and Determination We carefully lock our houses and cars, may even have our laptops hard-wired to the internet (through a router, of course). Men keep their wallets in a front pocket and women hold their purses in front and close. We shred important documents, read our credit card
Large government agencies often face daunting application modernization challenges with complex code accumulated over decades.
A leading ocean transportation company and an expert in maritime logistics and planning needed to replace their mainframe with a package application for controlling worldwide shipments. The company chose CM evolveIT to document business rules and the complex interactions between programs.
Code is typically developed over many years by a succession of developers, each with their own level of expertise and understanding of the business objective. Even the best contractor faces a major productivity hurdle in coming to grips with it.