Alpha Software Blog



Executing Shell Commands Directly from the Interactive Window


You can now execute shell commands directly from the Interactive Window. You no longer have to open a separate CMD window to execute shell commands. This can be a very useful time saver for developers.For example, when building an application that uses REST APIs, it is common for the API documentation to show how you can use CURL to execute the REST command. Using the Interactive Shell, CURL commands can be executed directly from the Interactive Window.Alpha Software


 

Alpha Software

Prev Post Image
Configuring AlphaDAO Connections When Publishing to a Remote Server
Next Post Image
Oracle survey shows why you need a better mobile app platform -- now!

About Author

Default Author Image
Chris Conroy

Chris Conroy runs digital programs for Alpha Software.

Related Posts
Manufacturing Data Collection Systems: Manufacturing Efficiency and Productivity In The Fourth Industrial Revolution
Manufacturing Data Collection Systems: Manufacturing Efficiency and Productivity In The Fourth Industrial Revolution
New Webinar: How to Integrate ChatGPT with Alpha Anywhere
New Webinar: How to Integrate ChatGPT with Alpha Anywhere
Best Data Collection Software For Manufacturing [2024]: A 101 Guide
Best Data Collection Software For Manufacturing [2024]: A 101 Guide

The Alpha platform is the only unified mobile and web app development and deployment environment with distinct “no-code” and “low-code” components. Using the Alpha TransForm no-code product, business users and developers can take full advantage of all the capabilities of the smartphone to turn any form into a mobile app in minutes, and power users can add advanced app functionality with Alpha TransForm's built-in programming language. IT developers can use the Alpha Anywhere low-code environment to develop complex web or mobile business apps from scratch, integrate data with existing systems of record and workflows (including data collected via Alpha TransForm), and add additional security or authentication requirements to protect corporate data.

Comment