Developer products are those used by most developers of desktop computing.
In some cases (Proje is a great example) they can be used straight out of the box. Some applications are stripped-down byt functional proof-of-concept models.
Below you will find a list of functional developer applications that you can obtain from this web site.
Automatic alignment of controls on a GUI form.
Especially suitable for GUI forms that are generated dynamically from user-selected options of processing
Build a custom licensing scheme for your application.
You want a comprehensible but cheap system to thwart the simplest users; the federal government is not interested in you. You are interested in restricting piracy of your custom application while allowing users to make some use of the system on a trial basis. As well you want the ability to offer a perpetual license to approved users.
Includes hardware and Software signatures, passwords, obfuscation etc.
Simple DOS batch job capable of backing up networked computers to multiple encrypted external drives, automatic shutdown, restart or dismount at end of job. Uses TrueCrypt and RoboCopy.
Given a set of lengths (of items) and a buffer length, arrange the items in best-fit manner.
Use this to arrange movies or songs on CDs and DVDs, Tollbar menus, make a set of tubular bells, and much much more. Download a free copy of this developer’s tool now!
Precursor to PROJE
This document describes pretty well everything you need to know about migrating a set of files from WordPerfect format to Microsoft Word document format.
We dismiss the idea that conversion of WordPerfect documents to a clean set of Word documents is a simple one-shot pass over the files. It is an iterative process.
A good guideline is to assume at all times that the client does not know what is in the documents. This is not antagonistic. It is based on our experience that no one has manually inspected 20,000 files within the last five years, and each file can hold deadly secrets. The client will assure us that linked files are derived solely from
Drives a subscription emailing service.
Unlike regular services, this permits a new user to begin at article number one (the first lesson in a correspondence course), and specify the interval (in days) between each lesson.
- A set of utility routines that allows me to obtain data from, and place data in, a database in any form.
- A set of routines to inspect and clean the contents of a database.
- Any record-source of data can be thought of as one or more simple tables.
The rules-based data cleaning utility was based on the same premise as my rules-based document cleansing utility – before any meaningful work could be done on a set of documents, we ought first to coerce the documents into a corporate standard.
This too arose out of the Connaught Drug Laboratories project.
In manual mode it allows an operator to identify potentially common text and builds a database of text items. The documents being processed thus for an inverted database, reducing the size of each document quite dramatically, but most importantly, reducing the time it takes to update old documents or create new documents.
In batch mode it uses the database of phrases as a reference and hunts for and replaces their occurrence in a batch of document, with links back to the stored phrase. It retro-fits a batch of documents.
Prototype code for a generalized debugging system
Based on a talk at NaSPA Wednesday, July 15, 2009 by Gord(on) McCart of SUN Microsystems.
De-duplication: the science and art of eliminating duplicate files backed up from multiple sources to a single backup device.
Typical example: My three networked computers (Laptop, Big Beige Box and IBM Server all run Windows XP. Each computer “owns” a folder on the multiple external backup drives (\Lap\, \BBB\, \IBM\). A C:\Windows\ file such as “explorer.exe” will appear three times on an external drive, once for each of the three computer folders.
Retaining one copy and providing two links to that one copy will reduce storage space AND reduce space/time when making images of the computer folder.
The application was designed to cater for legal firms where the partners use a printed form to hand-write entries into a table using short phrases to define the document to be produced, and what changes are to appear in the text.
The operator keys the hand-written data from the form into a table within a document, then stores that table data in a hidden module within the document.
A draft document can be generated from the data in the hidden module and submitted for inspection and correction.
Corrections need only be made to the table in the hidden module after which a fresh corrected draft can be produced.
The Files Processor is a device that allows the developer to build an application that trawls the hard drives of a computer, seeking files on which the developers application can be applied.
Developers who are tired of, or scared of, writing cumbersome loops using the DIR function or the File System Object, tired of tracking recursion of folders, testing extents and so on.
Let the Files Processor do all that for you, and leave you to focus on what you do best.
I don’t get it. I’m brilliant, but not that brilliant.
Why is my Word/VBA-written search faster than Microsoft’s by a factor of about 45?
Conversion of masses of documents, typically from WordPerfect to Word, is fraught with the difficulties, amongst them what are called “Untrappable Errors”. These errors are typically generated by 3rd-party code that is not married into Microsoft Word’s system of trapping run-time errors.
I have developed a software suite which can run unattended and detect these so-called untrappable errors, deal with them (usually by logging the event and excluding the file from the list), allowing overnight runs to be completed without interruption before the start of the morning shift.
Uses Google Finance, Yahoo Finance and Microsoft Money Central to perofrm numerical analysis and flitering of data obtained from public financial statements.
Driven by a table of company names or ticker symbols, we access the income Staements, cash Flow and balance Sheets, crunch the numbers, and spit out inormatives lists of companies.
A generalised heuristic player for a set of games, perhaps board games.
We illustrate our thought processes with the game of Noughts-And-Crosses a.k.a. Tic-Tac-Toe, but we will generalise even that game by admitting any size board, and the rule for “Win” and the number of players!
The algorithm is translated to a computer program, written by our choice, in Microsoft Word VBA. We will therefore be demonstrating some features of Word VBA.
Migrating a Blogger web page to my local style sheet
Takes an HTML page or a CSS style sheet and breaks it out to indented lines of specific components.
Somewhat akin to the NESTeR or PROJE.
Peruse a given template and build an array from the template.
The array defines the styles present in the template, and the algorithm examines the table to buid a hierarchy of styles.
The table can be maintained as a simple Microsoft Word document.
At any time a new template can be created with a hierarchy of styles based on the maintaine dtable!
Automatically test the internal checksum of a Microsoft Word document and terminate if the file is not in the required state.
Documentation and demonstration code to intercept every File event in Microsoft Word
Generate Word templates from a Framemaker MIF text file.
Lightning-fast development of applications making use of 800 established and proven procedures for Word, Excel, most VBA project-ready applications.
Split FrameMaker MIF text files into managaeable data blocks.
Precursor to PROJE
Monitor is any application that monitors another application.
This version happens to be written in Microsoft Excel/VBA, but could as easily be written in Word//VBA or Corel WordPerfect, as a standalone EXE, and so on.
The idea is to use a running program to monitor another running program, and deal with un-trappable errors.
MyINI generates VBA code to manage environment values in an INI file.
I generate applications and make them customizable through an INI file. During the process of writing the application program code I cause various default values to be charged into the INI file.
Once the application is in written, I need a fast means of producing the code to manage the INI file values through a GUI form. This developer application generates most of the basic code for me straight from the INI file.
Skeletal code to access and maintain a MySQL online database
NewSense technology is a new approach to avoiding annoying emails. “Spam” and “Virus” terminology just does not work in today’s market. A new term for it is “emaul”
The method of detection must be language-independent. Not all nuisance emails will arrive from England, and anyway, not all nuisance emails arriving from England will have text within the body. The method of detection ought therefore to be lexically and syntactically independent from any one human language. This is a good approach, for syntactic examination of languages is tricky, whereas the analysis of text strings is easy.
Uses a language grammar to parse sentences.
Determimnants are a small well-defined set of lexical atoms. They provide anchors for analysis.
Uses Acrobat Distiller to generate PDF files from within Microsoft Word
10 tools in one; harvests VBA code across a hard drive to build a searchable library; nests procedure code, removes deadwood procedures, sorts by procedure name in each module etc. Its main feature is its ability to build a string array with a complete description of a project, the array can be used to develop further applications, such as an obfuscator.
“The Fiscal Rascal”
- Given a text file of company names.
- Given a text file of financial statement field names
- Create a new Excel workbook
- Create range names for each field column
- For each company in the list
- Locate its financial statements
- For each field in the list
- Locate its value and load it to the sheet
Word application installer; renames stale versions, installs new versions.
Given a URL, develop an exhaustive site map to all web pages inferor to the (root) URL
Dynamic generatoion of toolbars in Microsoft Word 2000
This template is a Testbed for the analysis of syllables in a string.
Syllable analysis is applicable to many applications, not the least of which is the Interesting Words engine, précis generators, and readability indexes.
A device to collate hundreds of training modules of Task-Oriented-Training
The Train.dot application is designed to assist in the preparation of protected documents for distribution for private study.
It is by no means a secure method, but it does provide some techniques for thwarting out-and-out theft.
Train.dot provides examples of VBA code that can be used in other applications with some beneficial effect.
What I’m wondering is if there is a way that I can trap every action in Word and then replay it later, without them knowing. Scenario: A class has 40 students in an exam room. They all are doing work in Word to do writing. I suspect student 7, 28 and 39 of cheating. I then want to ‘see’ what they did during the exam. They have handed me a word doc that has been Chris-ified. Can I then run what they did at double or triple or whatever time?
Trap every keystroke, with its Ctrl, Shift, Alt combinations.; Trap every button click.; Log the keystroke or button click with a time-stamp.; Playback the log in real time; Playback the log with a specified interval between each key/click; Playback over a specified interval; Playback only specified keys/clicks
Over 30 modules of utility procedures for PowerPoint
UtINI provides everything that Microsoft provides, then more.
Key value strings that exceed 255 characters
Multiple keys within a section
Along the way we will be devloping utility procedures that serve us beyond the INI file.
Web compiler; roams a set of hyper linked documents from any point, produces or updates compiled web pages and optionally FTPs them to the web server. Reduces web maintenance to a 30-second edit of a Word document.
An early version of Wvain
The template for my WhatFAQ project management tool
Every project for every client gets a WhatFAQ. Over 350 of tjhem on my system at the present time.
The Wolff machine is a program that stores and retrieves phrases from a table or array. Until the array is full, user inputs are stored in the table. Once the table is full, the machine enters a replacement algorithm.
I met the Wolff machine via Dr R. S. Northcote of the ICL Software development Centre in Adelaide South Australia around 1970.
My recollection is that the Wolff machine demonstrated the accumulation of cocktail-party phrases (“Uh-huh”, “Go on!”, “You don’t say”) for primitive conversational machines, and to lend some human-ness to early interactive systems.
Precursor to PROJE