White Papers

    Software Activation

    Software Activation This paper demonstrates the software activation process and shows what goes on behind the activation dialog.

    AppProtect and Safe Activation

    AppProtect and Safe Activation This paper shows how to protect an application with AppProtect and link it to the Safe Activation server for automated activation.

    UML for Realbasic

    UML for Realbasic This paper shows how to model Xojo or Realbasic software with class diagrams, generate code from models and create models and source code from a Xojo project file.

    Source Code Translation

    Source Code Translation This paper shows how to translate source code from one programming language, OS or device to another.

    Software Design for PHP

    Software Design for PHP This paper shows how to model PHP software with class diagrams and structure charts, generate code from models and create models from code.

    UML for C#

    UML for C# Model C# software with the UML notation, generate code from models and create models from code.

    UML for Objective-C

    UML for Objective-C This paper shows how to model Objective-C software with the UML notation.

    Requirements Management

    Requirements Management This paper describes the process of collecting, managing and tracking requirements.

    System Models & Simulation

    System Models & Simulation See how to model, simulate and chart dynamic systems including financial, production, inventory, biological, chemical, thermodynamic or workflow.

    Realbasic Application Help

    Realbasic Application Help This paper shows how to present a help window from an application written in Xojo or Realbasic.

    Protect Adobe Air Applications

    Protect Adobe Air Applications See how to protect an Adobe Air application by adding a configurable activation and licensing process.

    Protect Max5 Applications

    Protect Max5 Applications See how to protect applications created with the Max graphical programming environment and encrypt your source code.

    Email Address for DRM Activation

    Email Address for DRM Activation See how a protected application or document can be activated with an email address. Send the same message to a large group of users and ensure that each can only activate on one computer.