COIHUNICATIONS SECTION 6.2
APPLICATIONS
6.2 HUNTER's communications can be used for transferring both
programs and data to other systems.
VER.V09F
Programs can be loaded into HUNTER daily, or as required, from a
central database. Secure protocols and program-based error
checks can guarantee accurate copies.
New, revised or corrected programs can be returned to the data-
base for storage. Database files an.d command functions can be
accessed automatically, or under manual control using HUNTER's
terminal emulation.
Data can be collected and down-loaded to mainframe, minicomputer
or microprocessor storage whenever required. Data transmissions
can be formatted exactly to resemble existing data terminal
configurations, allowing HUNTER to slot directly into existing
software support structures.
Database information (for instance, tables of names and
addresses) can be sent to HUNTER for presentation to operatives
in the field. Collected data can be linked to previously loaded
database information for instant verification and validation.·
PAGE 6 - 2