...
- Checksum verification to detect corrupt or incomplete file transfers
- Redistribute the included components as part of your application without additional fees
- Using CredentialStore Credential Store to securely store authentication, connection and other parameters
- How JADE ensure that file is completely written before transfer it?
- Can JADE read last record from received file to ensure complete transfer of file?
- Check File for completeness Steady state
- Advantages of using JADE instead of WinSCP as an OS independent Data Transfer Tool
...
- JADE CLI Configuration
- Using Configuration Files
- JADE CLI Parameter
- JADE JITL Parameter
- Server to Server Transfer
- Transfer to Multiple Destinations
- UNC Names
- WebDAV Examples
- CIFS Examples
- Transfer Using local host
- Commands parameter for the transferPre- and Post-Processing for File Transfer
- FileSelection by timestamp
- Advance setup JADE with Credential Store
...
- Using Parameters when setting up file order source
- Can you use file sink to rename and move file at the same time
- JADE How to wait for "file transmission is complete" with large files
-->
...
JADE : Use cases
- Use-Case A ___- Download the file from Vendor's FTP/sFTP server to User's desktop
- Use-Case B ___- Internal user generate the file and want to share the encrypted file with Customer over SFTP .
- Use-Case C ___- Legecy Batch system generate reports/input file for other systems/customer.
- Server to Server Transfer
- Server to Server Transfer with Polling
- Transfer to Multiple Destinations
- UNC Names
- WebDAV Examples
- CIFS Examples
- Atomic Transfer
- UseCase-0100 ___- Server2Server data transfer with processing steps
...