Perhaps the name “article” is an overstatement for this work, more exactly “an abstract”. This is just an abstract of the parameters of 1C:Enterprise command line with the examples of its use: both my own and pulled off from Internet.
Continue reading 1C:Enterprise 8 command line parameters
Category Archives: Common publications
Some information about 1С software products with software protection
Not so long ago, I aimed to find out what the software protection is and how to treat it. Here is what came of it.
Please do not judge strictly.
Continue reading Some information about 1С software products with software protection
How not to burn yourself on the 1C introduction
An article is for the leaders of organizations who are planning to introduce 1C on their enterprise. The first steps of customer for Computer Automated Management System are described. An article is written by manager of projects for 1C introduction, is based on his own experience of implementations. In the hasty approach of introduction, this process becomes a headache for the customer and the money-burning machine. In this article he described what errors are allowed for implementers and customers and how to avoid large investments in your own headache. Basically it concerns the introduction of configurations at the level of PEM and CA.
Continue reading How not to burn yourself on the 1C introduction
Under the hood of managed forms
Managed forms for a long time and firmly entered in the life of 1С developer. However, many people still are not familiar with them. I propose to examine what is it.
Introduction
This article is aimed at the developers who had already time as it chanced to work with the managed forms. If you already know well how the MF and generally the application managed interface work, you can not read the article, since hardly learn a lot.
Continue reading Under the hood of managed forms
Export data into EXCEL using ADO
Probably many people know that using the ADO technology it is possible to read quickly the large amounts of information from the excel books. But using this technology it is also possibly to create and fill easily the excel files.
Do not believe? Check this…
Continue reading Export data into EXCEL using ADO
Comparing the operation speed of 1C+MSSQL and file variant
The forums are constantly asking the same question: why 1C+MSSQL handles the requests slower than the file variant?
The usually the «flood» goes in a few dozen pages.
There are two popular «trends» in such forums — the first say that for the client-server variant this is normal, the file variant should always be faster, others say that 1С operates badly with DBMS.
Let’s try to find out.
Continue reading Comparing the operation speed of 1C+MSSQL and file variant
How fast you can and should develop the business applications?
The business applications are developed. They need to be developed. It is obvious. But how fast this can and should be done?
Of course, in general, this is an age-old question. Almost philosophical. There is no a single correct answer on it. More precisely, it is necessary to answer on it all the time. Too bad you can not make a decision once and then always follow it.
Continue reading How fast you can and should develop the business applications?
4 key problems of 1C:Enterprise deployment projects
Why is statistics so sad? Why the projects are failing one by one? Here there is another point of view for this fact 🙂
So. The project is failed. What is a reason?
Of course, the reasons can be a lot. Anyone you will look at looks clearly like the cause! And debriefing can be done until you are blue in face.
Continue reading 4 key problems of 1C:Enterprise deployment projects
Simple example of work with RLS
What is RLS?
RLS (Row Level Security) - restriction at the level of records in the database tables. In contrast to the delimitation of the rights base on the usage of roles that actually delimit access to the specific tables of base as a whole, RLS allows configuring an access to the specific records.
Continue reading Simple example of work with RLS
Technological log 1C:Enterprise 8 for the lazy
Technological log (hereinafter TL) is intended to detect the errors occurred when operating the system and to diagnose the work of technical support service of “1С” company, as well as to analyse the technical characteristics of system operation.
TL allows logging all the events of 1С:Enterprise (or their part using the filter), for example:
- executable code of 1С:Enterprise 8;
- Transact-SQL code for DBMS;
- interactive user actions;
- error messages;
- memory leaks.
Continue reading Technological log 1C:Enterprise 8 for the lazy