This manager allows to run automatically your background applications and restore them after crash.
S.P.E. comes with its custom RDD to extend DBF with advanced features like:
The HTTPS interface allows to interact via a REST-LIKE interface to pure VO classes.
For instance, you can write a class to be consumed by a web-site or mobile app, which communicate each other using JSON.
Simple scheduler which allows to plan execution of application at predefined intervals
It is possibile to run queries by passing a simple SQL string when opening the data, easy like writing DbServer{"SELECT * FROM CUSTOMERS WHERE NAME='JOHN'"}
S.P.E. comes with its own administration tool, a sort of DBU under steroids.
It allows to manage remote DBFs, visually design queries, browse data, access remote .INI files e and to view remote log files.
S.P.E. has its own query engine, which is accessible by code and very easy to use.
It allows to design queries without the hassle of writing lot of code, letting you to concentrate to the result.
As for classic VO objects, S.P.E. has the CreateRemoteInstance function which returns a instance to the remote object, to which you call methods like any other instance.
The main difference is that remote objects can only manage late-bound calls because they are running outside the application process.
Use remote DBF using a true TCP/IP connection without the need to change almost any code because the RDD is compatible with DB like functions and DbServer class.
Our RDD is optimize to reduce network usage through its local caching mechanism.
Each connection needs to authenticate by providing user name and password
It is possibile to restrict users by their IP address and to limit filesystem access.
Each connection runs in a separate server-side process, this avoids that one session crash could impact the others
The login mechanism is handled by a runtime generated asymmetric key exchange.
The client library automatically restores the connection if it was lost or where it is unstable.
The service automatically put in a blacklist the IP address which fail authentication or doesn't send recognized command after 20 times.
The setup quickly and simply installs all the software and write all the settings needed to taste its main features.