Page 1 of 1

Proposal .. 'just not xBase any more'

Posted: Tue Mar 07, 2017 2:26 pm
by Rick Lipkin
Antonio

As you know I have been using FiveWin for many years and have found it to be a remarkable language. All the new Programmers who enjoy 'writing code' find FiveWin to be one of the MOST powerful languages to connect to any RDMS ( sql server, oracle, ms access ), connect to any OLE program, device or application and the use of Object Oriented Classes and Methods.

I want you to notice I made a clear distinction above by using the phrase 'writing code' and NOT some button pushing IDE brainless ( so called ) programmer. When I left State government several years ago the CIO was absolutely 'frantic' because the existing programmers in the Agency only knew Visual Studio. I surrendered all my programs and there was not a single 'coder' in the Entire Agency, except one. The Visual Studio folks have 'no clue' .. could not understand the syntax, not even the ability to follow simple logic. ..

True Story ... One of my largest Enterprise applications ( vehicle fleet management ) needed a coding change to allow more than one vehicle reservation per day. There wasn't a single Visual Studio programmer that could understand my code .. but fortunate for the Agency there was an Oracle Forms programmer that worked ( not for the centralized IT ) but in a separate deputy area who was also a long time 'coder' that was asked as a 'last resort' to see if he could make the appropriate changes to my program.


As it turned out this 'coder' was able to read the programming flow and understand where to look for and make the ( minor ) changes to my code. I was told he had the changes made and re-compiled with in a day, where all the other IDE programmers were absolutely clueless.

The reason I bring up this distinction is because our young programmers are being schooled in Visual Studio and dot net to create C# ( web ) applications. Historically, what I have seen with C#, Microsoft ASP.NET MVC framework is that Visual Studio may make it easy to create SIMPLE web applications, but when you throw in just a few business rules .. the IDE crowd just never can seem to get anything done or completed. The organization burns through multiple programmers, then adds Business Analyst's and then Project Managers to manage the sprawling project, and before long you have a simple app that should have taken six months or less to create, turn into multi-million dollar fiasco that ends up with nothing but overwhelming money spent and at the end of the day a pile of "_rap" for code.

From the Internet :

Programming with .NET is like cooking in a McDonalds kitchen. It is full of amazing tools that automate absolutely everything. Just press the right button and follow the beeping lights, and you can churn out flawless 1.6 oz burgers faster than anybody else on the planet.

However, if you need to make a 1.7 oz burger, you simply can’t. There’s no button for it. The patties are pre-formed in the wrong size. They start out frozen so they can’t be smushed up and reformed, and the thawing machine is so tightly integrated with the cooking machine that there’s no way to intercept it between the two. A McDonalds kitchen makes exactly what’s on the McDonalds menu — and does so in an absolutely foolproof fashion. But it can’t go off the menu, and any attempt to bend the machine to your will just breaks it such that it needs to be sent back to the factory for repairs
.


I am concerned that the perception of FiveWin\[x]Harbour is linked too closely to xBase which is a dying relic of the 1980's and 90's. I recently saw the Programming HM Survey on the Harbor Forum ( sure you probably did as well ) :

Image

Gui of choice was FiveWin !!

Image

typical age :

Image

and as you can see the under 30 crowd doesn't know what the FiveWIn language is all about .. and it appears Microsoft and the Visual Studio crowd are winning over our up and growing Programming talent ... see this response:

Image

I would like to propose a topic for discussion at your FiveWin convention this summer to ask for input of the folks on how to get a more mainstream awareness of FiveWin and to advertise to the younger crowd! .. to let the folks ( including the CIO's ) know there are other viable programming language choices available and ( perhaps ) distance ourselves from the xBase connotation.


Here is ( one of many ) polls of top programming languages to learn in 2017 :

Image

Why not FiveWin as an Up-and-coming-language ( with a clean start ) ... because It's Just Not xBase AnyMore!

Thanks .. Your Comments are Welcome,

Rick Lipkin

Re: Proposal .. 'just not xBase any more'

Posted: Tue Mar 07, 2017 3:18 pm
by Enrico Maria Giordano
I agree with all you have written except that I can't understand why we have to focus on the language and database used. A programmer who knows the logic can easily use any programming language and any databases.

EMG

Re: Proposal .. 'just not xBase any more'

Posted: Tue Mar 07, 2017 4:29 pm
by TimStone
Rick,

When I started xBase programming in the very early 80's, my first goal was to understand WHAT I needed to build ( as a solution ) and for WHO that would work efficiently. I spent a lot of time learning about my clients ( small businesses ), their needs, how they ran their companies, and only then did I create code that would allow them to do their work. At my early trade shows, people would look at my software and say "that's how I run my business". Even under DOS, it was an "intuitive interface".

My concern today is that our young people are encouraged to create and dream, but they have no clue about the audience for whom they are building programs. It doesn't matter if you use Visual Studio, or any other tool. They simply do not know the job for which the solution is built. They see no need in focusing on the needs. They only create.

I actually engaged Satya Nadella on this very topic ( yes directly ) a couple of years ago. Nothing changed, and Microsoft still focuses on the creativity rather than the productivity. However, I am finally seeing that some areas of the company are "seeing the light" and seeking more user input. Unfortunately it is not translating to the people who actually create the coded solutions needed by small businesses.

I think it is interesting that Access has been a tool used by companies to get into their primary data and handle it in special ways. When Microsoft first offered a Small Business Office 365 package, Access was included. However, about a year ago, it was dropped. Enough people complained that it was finally added back. In addition, for several years, it lacked the ability to work with DBF files. Toward the end of last year, someone actually listened to what was being said, and they are adding back DBF functionality.

Of course this means there is still room for "we old timers" who can still write solution code. FWH, with Harbour, and MSVC gives me the ability to make very specific contributions to the companies I serve. That's why I still use it. As for DBF's ... I find them lean, sufficiently fast, fixable, and so easy to work with that I likely will not transition to SQL for my primary product.

Tim

Re: Proposal .. 'just not xBase any more'

Posted: Tue Mar 07, 2017 4:35 pm
by MarcoBoschi
Rick,
there is much confusion in this world of programmers.
There is room for everyone.
I'm used to using this language and I am very well.

I don't think that is a good idea to take distance from the xBase connotation,
on the contrary, I'm convinced we have to preserve it for the fact that if it exist for so many years it means it is a great tool.

Re: Proposal .. 'just not xBase any more'

Posted: Tue Mar 07, 2017 11:00 pm
by Colin Haig
Hi Rick

The younger generation have grown up with the internet and now these younger people are the people starting business's. The reason there is no younger developers
choosing xBase or any other desktop app tool is because the market has shifted - and new developers have to program for these markets. (Web,Mobile,Cloud)

Cheers

Colin

Re: Proposal .. 'just not xBase any more'

Posted: Wed Mar 08, 2017 2:16 pm
by Rick Lipkin
Colin

To me it makes no sense to create database Web apps to run in your organization if you have a large MPLS ( private ) network .. say, like State Government or Federal Government.

If you want to program for the cloud or to allow your data to be shared from outside your MPLS network .. there are a world of hackers that want to and will hack your site and steal your data .. or, worse yet throw a DDOS attack against your site and take you down in a heart-beat ..

I worked for a short time at a large Construction Management firm in the SouthEast USA and I inherited a Database web application that the Construction and Project managers used in the field ... I came to work one morning last year and logged into the site and much to my chagrin, I saw and heard a Russian song playing in my browser saying I was just hacked .. took me a week to clean up that mess ..

Also on a related note, don't know if anyone noticed that Outlook.com, xBox and Skype were down yesterday morning .. wonder how that happened to one of the largest and most sophisticated Companies in the World .. hmmmmmm

http://www.theverge.com/2017/3/7/148412 ... march-2017

Just did a quick Google Search on the Greatest Data Breaches of 2016 ..


FACC

January 25, 2016: FACC, an Austrian-based aerospace parts manufacturer (with clients like Airbus and Boeing), announced they fell victim to hackers in January 2016. The criminals, however, seemed to ignore the company’s data and intellectual property, opting to instead steal approximately €50 million — which is equivalent to about $54.5 million U.S. dollars. FACC says that while they are investigating the extent of the damage and how it happened, their normal operations have not been affected.

University of Central Florida

February 8, 2016: At the beginning of February 2016, the University of Central Florida announced a data breach that affected approximately 63,000 current and former students, faculty, and staff. The breach was discovered in January, but before making the incident public, the university reported it to law enforcement and conducted an internal investigation. Unknown cyber criminals compromised the university’s computer system and stole a variety of information including Social Security numbers, first and last names, and student/employee ID numbers.

U.S. Department of Justice

February 9, 2016: Hackers angry about U.S. relations with Israel tried to call attention to their cause in February 2016 by breaching the U.S. Department of Justice’s database. CNN reported the hackers released data on 10,000 Department of Homeland Security employees one day, and then released data on 20,000 FBI employees the next day. Information stolen included names, titles, phone numbers, and e-mail addresses; the Department of Justice does not believe that any sensitive information, like Social Security numbers, was obtained. Tweeting from the account @DotGovs, the hackers said it took one week for the Department of Justice to realize that their systems had been compromised.

Internal Revenue Service

February 29, 2016: The Internal Revenue Service (IRS) announced that the data breach they uncovered in May 2015 was much larger than initially believed. In May, the IRS said over 100,000 American taxpayers had their personal information compromised when the agency’s “Get Transcript” system was hacked. However, in February 2016, those numbers have been increased to over 700,000. The IRS thinks a sophisticated Russia-based criminal operation is responsible for the data breach and that identities were stolen to file fraudulent tax returns in the future.

UC Berkeley

February 29, 2016: The financial data of more than 80,000 University of California, Berkeley students, alumni, employees, and school officials was compromised around December 2015 and announced to the public in February 2016. The school says that although it was clear their system was hacked, it does not appear that any information was stolen. Those who may have been affected were notified and encouraged to keep an eye on their personal information.

Snapchat

March 3, 2016: 700 current and former Snapchat employees had their personal information stolen when hackers used a phishing scam to trick an employee into e-mailing them the private data. Posing as Snapchat chief executive Evan Spiegel, the attackers simply requested — and received — sensitive employee information including names, Social Security numbers, and wage/payroll data. It is presently unclear who is responsible for the attack or how they may use the information they stole.

21st Century Oncology

March 10, 2016: 21st Century Oncology, a Fort Myers-based company offering cancer care services, revealed in a statement on their website that 2.2 million patients may have had personal information stolen when the company’s system was breached in October 2015. The breach was discovered in November 2015, but the FBI discouraged the company from making a public announcement until March, as the investigation was ongoing. Though there is no evidence that the data has been used in any way, hackers did have access to patient names, Social Security numbers, doctor names, diagnosis and treatment information, and insurance information.

Premier Healthcare

March 10, 2016: A data breach was reported by Premier Healthcare, a multispecialty provider healthcare group, after a laptop computer was stolen from the billing department of their Bloomington, Indiana headquarters. The laptop was protected by a password, but it was not encrypted and contained sensitive data pertaining to more than 200,000 patients. Most victims affected had their names, dates of birth, and other basic information compromised, but Premier Healthcare says that 1,769 individuals may have had their Social Security numbers or financial information taken as well.

Verizon Enterprise Solutions

March 25, 2016: Verizon Enterprise Solutions, a division of Verizon known for providing IT services and data breach assistance to businesses and government agencies around the world, was hit by hackers who stole the information of about 1.5 million customers. The data was found for sale in an underground cybercrime forum by cybersecurity journalist Brian Krebs. Verizon acknowledged the breach, saying that they’ve found the security flaw, and are working to contact affected customers.

Systema Software

March 28, 2016: A data breach at California-based Systema Software was not the result of hackers, but an internal error during a system upgrade in which data storage was set up improperly and made publicly available on the Internet. Chris Vickery, a white-hat hacker, found the information online and reported it to the proper authorities — by that point, customer information had been exposed for 75 days. Affected customers include the Kansas State Self Insurance Fund, the CSAC Express Insurance Authority, American All-Risk Loss Administrators/Risico, Millers Mutual Group, Crosswalk Claims Management, and Salt Lake County. Currently, it is not believed that any of the personal information has been used illegally.

Tidewater Community College

March 28, 2016: Current and former employees of Tidewater Community College (TCC) in Norfolk, Virginia had their personal information stolen in a tax season phishing scam. An employee in the school’s finance department received a request from a fake TCC e-mail address asking for all employee W-2 information. The individual, not realizing the e-mail was fake, responded with sensitive information including names, earnings, and Social Security numbers. TCC’s spokesperson has said that at least 16 TCC employees have reported false tax returns filed under their Social Security numbers.

MedStar Health Inc.

March 30, 2016: The FBI is investigating a computer virus that paralyzed MedStar Health-operated hospitals in Maryland and Washington. Officials are trying to determine whether the virus was ransomware, which holds a company’s systems “hostage” until a specific dollar amount is paid. It is not immediately clear whether any patient information was stolen, but with the popularity of medical identity theft among hackers, it is certainly possible that personal data was compromised.

Philippine Commission on Elections

April 11, 2016: A breach of the database for the Philippe Commission on Elections (COMELEC) prompted Infosecurity Magazine to say it “could rank as the worst government data breach anywhere.” It is believed that the personal information of every single voter in the Philippines — approximately 55 million people — was compromised on March 27, 2016 by Anonymous; LulzSec Pilipinas published the database online a few days later and those private details are now available online for anyone to steal and engage in all different types of identity theft. Anonymous’ actions were allegedly an effort to push COMELEC to turn on security features in the vote counting machines before the national elections on May 9.

Multiple Major E-mail Providers

May 5, 2016: Milwaukee-based Hold Security discovered more than 270 million e-mail usernames and passwords being given away for free in the Russian criminal underground. It is unknown how all of the accounts were stolen, but Hold counted about 57 million Mail.ru accounts, 40 million Yahoo accounts, 33 million Hotmail accounts, and 24 million Gmail addresses. There were also hundreds of thousands of German and Chinese email providers, along with username/password combinations that seem to belong to employees of major banking, manufacturing, and retail companies.

Wendy’s

May 11, 2016: In January 2016, Wendy’s began investigating a potential data breach after receiving reports of unusual activity involving payment cards at some of their restaurant locations. The details of that investigation became public in May, as the fast food chain revealed that less than 5 percent of its restaurants were affected. The company believes that malware infiltrated one particular point of sale system at fewer than 300 of approximately 5,500 franchised North America Wendy’s restaurants, starting in the fall of 2015. Security expert Brian Krebs said many bank and credit unions “have been grumbling about the extent and duration of the breach” and that it seems some breached Wendy’s locations were still leaking customer card data as late as the end of March 2016 into early April.

June 16, 2016 Update: In June 2016, Wendy’s announced that their data breach was worse than they originally thought. The company did not provide much additional information — only that “additional malicious cyber activity has recently been discovered in some franchise-operated restaurants.” They said that they disabled the newly discovered malware, but that “the number of franchise restaurants impacted by these cybersecurity attacks is now expected to be considerably higher than the 300 restaurants already implicated.” Wendy’s is continuing to work with security experts and federal law enforcement who are investigating the breach. Customers with questions can call 888-846-9467 or email PaymentCardUpdate@wendys.com

LinkedIn

May 17, 2016: A 2012 data breach came back to haunt LinkedIn when 117 million email and password combinations stolen by hackers four years ago popped up online. At the time the breach occurred, members who had been affected were told to reset their passwords. That information then became publicly available in May 2016. LinkedIn acted quickly to invalidate passwords of all LinkedIn accounts that were created prior to the 2012 breach and had not undergone a reset since the breach. It is not clear who stole the information or published it online, but LinkedIn is actively working with law enforcement officials.

Newkirk Products

August 12, 2016: In August 2016, Newkirk Products, a service provider that issues healthcare ID cards, announced a data breach that may have affected up to 3.3 million people. Unknown hackers were able to gain access to a server that contained sensitive member information, including names, mailing addresses, dates of birth, and details about health insurance plans. At this time, it does not appear that any of the stolen information has been used maliciously.

Oracle

August 12, 2016: The company that owns the MICROS point-of-sale system, used in more than 330,000 cash registers around the world, became the victim of a data breach, which was announced to the public in August of 2016. At the time the breach was uncovered by security expert Brian Krebs, it was unclear as to the size and scope; Krebs did say that a large Russian cybercrime group was likely to blame and that they had placed malware on company computers and on the MICROS customer support portal to steal usernames and passwords. Many experts also believe the hackers were probably able to plant malware in the MICROS point-of-sale systems and that they could be responsible for major data breaches at retailers around the country.

Dropbox

September 2, 2016: The popular file-hosting service was forced to confront a data breach from four years ago that affected more users than originally believed. In 2012, Dropbox helped a small amount of users secure their accounts after some usernames were stolen. At the end of August 2016, however, it was revealed that more than 68 million Dropbox users had their usernames and passwords compromised in that initial breach. It does not look like the accounts have been illegally accessed at this time, and all Dropbox users who have not reset their passwords since 2012 have been prompted by the company to do so.

Yahoo!

September 22, 2016: In what may be the most expansive data breach of all time, Yahoo announced that a hacker had stolen information from a minimum of 500 million accounts in late 2014. The thief, believed to be working on behalf of a foreign government, stole e-mail addresses, passwords, full user names, dates of birth, telephone numbers, and in some cases, security questions and answers. At the time of the breach announcement, Yahoo was still working with law enforcement and the FBI on an investigation.

Weebly

October 20, 2016: Over 43 million Weebly users were notified about a data breach that happened in February, but was just discovered in October. Stolen data included usernames, passwords, e-mail addresses, and IP information, but Weebly does not believe any type of financial information was stolen because it does not store full credit card numbers on its servers. Hackers were not able to log directly into customer websites because passwords were protected by bcrypt hashing.

National Payment Corporation of India

October 20, 2016: The National Payment Corporation of India (NPCI) was notified by international banks, primarily in the U.S. and China, that some of its customers’ debit cards were being used illegally. Experts believe the breach began with a malware attack that originated at an ATM. The NPCI said that 32 lakh debit cards across 19 Indian banks were compromised, but customers were contacted to change the debit card PINs and customers they couldn’t reach had their cards canceled and were issued new ones.

Cisco

November 3, 2016: An incorrect security setting on the mobile version of Cisco’s “Professional Careers” website created a privacy hole that exposed the personal information of job-seekers. Discovered by an independent researcher, the security vulnerability made sensitive data available between August and September 2015, and again from July to August 2016. That data included names, addresses, e-mails, phone numbers, usernames, passwords, answers to security questions, resumes, cover letters, and voluntary information such as gender, race, veteran status, and disability.

At this time, there is no evidence that any other parties accessed the job-seekers’ information, other than the independent researcher. Cisco did say, however, that “there was an instance of unexplained, anomalous connection to the server during that time, so we are taking precautionary steps.” Those steps include alerting all Cisco job-seekers to the breach, requiring all users to reset their passwords, and offering to put 90-day fraud alerts on accounts for interested users.

AdultFriendFinder.com

November 13, 2016: AdultFriendFinder, an X-rated website, was targeted by hackers for the second time in two years. This time, though, the amount of accounts compromised was immense — approximately 412 million users had personal information stolen and published in online criminal marketplaces. The breached data included e-mail addresses, passwords, VIP member status, browser info, last IP address to log in, and purchases. LeakedSource is responsible for finding and reporting the breach to the public; AdultFriendFinder has only admitted to finding a vulnerability and has not confirmed the attack yet.

San Francisco Municipal Transportation Agency

November 25, 2016: San Francisco’s public railway system, known as Muni, was infected with malware over the Thanksgiving weekend; this resulted in locked kiosks and computers and two days of free rides for passengers until the system went back online on Sunday, November 27. Fortune reached out to the hackers, who said the attack was not targeted — it was an automated attack, also known as a “spray and pray.” In this type of attack, an automated system sends links to malware out to many prospective victims; an IT admin at the transportation agency allegedly clicked on the link and unknowingly downloaded the malware files.

The hackers claim to have 30GB of stolen data, which includes the personal information of employees and riders. They want the agency to fix its vulnerable systems and pay a ransom of 100 Bitcoins, or about $73,000 — if their demands aren’t met, they say they will release all of the personal information. The agency’s systems are back online, but as of now, it does not appear that they have paid the hackers.

Yahoo

December 14, 2016: Less than three months after announcing a 2014 data breach that affected 500 million users, Yahoo did it again — and even bigger than before. In December, the company discovered another breach from 2013 that may have compromised the personal information of one billion Yahoo accounts, making it the largest data breach in history. At the time of the breach announcement, Yahoo did not have much additional information to share with the public, as it was still unclear who was responsible, how they got into the system, and what they stole.

Re: Proposal .. 'just not xBase any more'

Posted: Wed Mar 08, 2017 3:02 pm
by reinaldocrespo
Hey Rick;

Interesting read. Thank you for putting this list together. I think we are all aware of the fragility of databases out there but reading this sequence you've put together is bone chilling. Some of them, I wasn't aware of. University of Central Florida? Berkeley? 2.2 M patients on Century Oncology at Fort Myers? Really? Damn!

I think you are trying to make a point about computer languages but I can't exactly see the connection. These databases being hack are front-end independent. Hackers usually get in by obtaining the right credentials from unsuspecting users. That would be all the same regardless of the front-end. Don't you think?

Good to see you around.

Reinaldo.

Re: Proposal .. 'just not xBase any more'

Posted: Thu Mar 09, 2017 4:48 pm
by TimStone
Rick,

My clients are all small business owners. Some have great internet connections, and others have very poor ones that are often down. When people call wondering if my software is web based, I ask about their internet service. It's humorous how many do not understand the relationship between their service quality and cloud based computer programs.

Many of my clients use cloud based services for ordering, or data reference, but the critical data for the operation of their business is always on their local network. My primary application does reach out to those cloud based resources, but when an internet connection fails, they are able to still continue you their main operations. This works well.

I stick with xBase because it actually allows me to do things I rarely, or never, see in "normal windows programs".

With all of that said, I do develop in Visual Studio 2015 ( soon to be 2017 ), but the language I use is xbase. It may not be one of the ones distributed by Microsoft, but in fact, FWH and Harbour integrate quite nicely. I actually have a full project file that I open, and the complete build ( and testing ) is done in Visual Studio. So, a VS programmer could actually do what we do if they simply learned xBase commands and functions.

I think the fact that Microsoft ( by demand ) has recently added back .dbf support to Access says a lot ( meaning, it clearly is not dead ). The reason stated was a large presence of .dbf based programs still exist and they see the need for external support for the data which can be done in Access.

Tim

Re: Proposal .. 'just not xBase any more'

Posted: Thu Mar 09, 2017 10:02 pm
by Rick Lipkin
Tim, Reinaldo

When I look a programming jobs all I see is :

Image
Experience using Visual Studio C#, Microsoft ASP.NET MVC framework (C#, ASP.NET, ADO.NET) environment and experience using jQuery, HTML, CSS and reporting in web application development.
I worked for the above agency .. and they have a State Wide MPLS ( private ) network .. I have no idea why anyone would want to create a Web App for internal use .. and the above mentioned Agency has only been able to create two web apps in 7 years .. one half way works and the other cost over ( lets say ) several 100's of thousands of dollars and it is plagued with all kinds of problems and a whole new Help Desk group of folks grew up around the problems of this second app .. and that is a ( very ) simple Invoicing and Accounts receivable application. I wrote a very nice invoice and receivable system for a different State Agency ( on contract ) and it only took six months and $ 2500.00.

Image


Rick Lipkin

Re: Proposal .. 'just not xBase any more'

Posted: Thu Mar 16, 2017 2:02 pm
by Rick Lipkin
Antonio and Friends ..

I think most Developers, Cio's and large Corporations know that Dot net is NOT a viable solution to maintain on hundreds or thousands of computers.. So many security patches and updates .. how can you maintain that many changes on so many computers .. hence, the rise of Database ( internal ) web applications... all you have to do is maintain 1 server with dot net instead of hundreds of thousands of computers.

Most developers would rather use a GUI rather than a Web app because GUI can do So Much More than HTML .. to me, web browsers are great for Content and not for Database Web development ... BUT no one knows there are viable NON DOT net alternatives.

Perhaps a FiveWin re-branding might include something like this, especially to reach our younger programmers and to let the Marketplace know there is a Dot Net Alternative:
Non Dot Net Application Development alternative to create Enterprise GUI applications leveraging the Native Windows 7 and 10 API . Additional support for other Operating Systems API’s include:

Linux Mint, Ubuntu
Mac OS10

Includes Object Oriented Classes specifically engineered to manipulate today’s modern SQL RDMS databases :

MS Sql Server
MS Access
Oracle
My Sql\MariaDb

OLE native Support
Support for modern standards: JSON, SSL, TCP/IP, XML

Available to create a standalone .Exe in 32 or 64 bit using your favorite C++ Compiler including:

Embarcadero- Borland 32\64 bit
Mvsc 32\64 bit

Supported by technical Experts worldwide
I know that .dbf is still a viable solution .. but today's Corporate Enterprise applications run on Sql Databases and as I mentioned .. "It's NOT just xBase any more"

Comments Welcome!

Rick Lipkin