HUNTER’s communications can be used for transferring both programs and data to other systems.
Programs can be loaded into HUNTER daily, or as required, from a central database. Secure protocols and program-based error checks can guarantee accurate copies.
New, revised or corrected programs can be returned to the database for storage. Database files and command functions can be accessed automatically, or under manual control using HUNTER’s terminal emulation.
Data can be collected and down-loaded to mainframe, minicomputer or microprocessor storage whenever required. Data transmissions can be formatted exactly to resemble existing data terminal configurations, allowing HUNTER to slot directly into existing software support structures.
Database information (for instance, tables of names and addresses) can be sent to HUNTER for presentation to operatives in the field. Collected data can be linked to previously loaded database information for instant verification and validation.