Develop at speed using the latest JADE platform.
For developers wanting an additional layer of verification in regards to the authenticity and integrity of our binaries, carry out the following steps.
- If you don't already have the latest version of the sysinternals sigcheck tool, you can download it here.
- For the following commands, substitute
Jade-Binarywith the specific name of the file you have downloaded.
1. In order to verify that the publisher is in fact Jade Software Corporation, run the following command
sigcheck -a <Jade-Binary>
In the output, the
Publisher key should have a value of
Jade Software Corporation Limited verbatim. If the
Publisher key is not as specified, then the binary may not be a genuine JADE binary and shouldn't be used.
2. Check that the file size is correct with the following command
sigcheck -i <Jade-Binary>
In the output, the
Verified key should have a value of
Signed rather than:
Signed but the filesize is invalid
3. As a final check, using Virus Total (which compares the file you have downloaded with the Virus Total database) confirm that the file doesn't contain any known malware
VT detectionshould be either
or a fraction showing
number-of-scan-enginesis the number of scan engines that the
Jade-Binaryhas been run against on Virus Total.
VT linkshould be
n/aor a link to the Virus Total results.
If it is not, do not run the file you have downloaded and checked.
Choose your version
SOFTWARE SOURCE CODE LICENSE
PLEASE READ BEFORE DOWNLOADING
Jade Software Corporation Limited (Jade) is the owner of copyright and all other intellectual property rights pertaining to the Software, the subject of this Agreement. The Licensee wishes to receive the Software in Source Code form. Jade agrees to supply Source Code to Licensee on the following terms and conditions:
"JADE™" means the operational release of JADE™ software released by Jade together with any associated documentation and any new JADE™ release or part thereof. "License" means this Source Code License. "P Code" means the Software in Pseudo-Code form following loading of the Source Code by the Licensee to the JADE™ repository for the Licensee's application use. "Software" means the Software, in all code forms, whether in whole or in part as detailed in the Schedule and includes any updates supplied by Jade. "Source Code" means the Software in source code form. "Intended Use" means the use detailed in the Schedule.
- Grant of License
Jade grants to Licensee the right and license to possess, and load the Source Code for the Intended Use only.
The Source Code may not be modified by the Licensee without the prior written consent of Jade.
The Licensee may make only so many copies of the Source Code as are reasonably necessary for backup purposes.
The Licensee must retain all copies of the Source Code under its effective possession and control.
- Source Code Secrecy to be Maintained
The Licensee agrees that the Source Code constitutes or contains confidential information of JADE, and embodies trade secrets developed at substantial cost and expense.
The Licensee shall hold the Source Code in confidence for Jade. The Licensee shall employ reasonable secrecy precautions, at least as protective as the precautions it uses to protect its own confidential information, to protect the Source Code from unauthorized copying, use or disclosure.
The Licensee shall allow access to the Source Code only to employees of the Licensee or contractors to the Licensee who are loading the Software for the Intended Use and who have a need to know information contained in the Source Code. The Licensee agrees to use all reasonable efforts to prevent any actual or threatened unauthorized copying, use, or disclosure of the Source Code.
- Ownership Warranty
Jade warrants it has unencumbered right to license the Software.
Jade will during its normal business hours, provide telephone accessed support to the Licensee for the Source Code. JADE reserves the right to charge the Licensee for time spent on problems reported by the Licensee that turn out not to be faults in the Source Code, at JADE's then current rate.
- Duration of License
This License shall subsist only for so long as the Licensee has applications containing the Software for the Intended Use unless terminated sooner under Clause 7 below.
- Termination, Effect of Expiration or Termination
should the Licensee commit a breach of any obligation hereunder, Jade may, at its option, terminate this Agreement immediately on written notice to the Licensee. Such notice shall state the default upon which termination is based.
Upon termination (or expiration of the term of this Agreement), the rights and license herein granted shall terminate. The Licensee shall destroy or return to Jade all copies of Source Code in its possession and control and certify the same to Jade in writing.
- No Assignment
The Licensee represents that it is acting on its own behalf and is not acting as an agent for or on behalf of any third-party, and further agrees that it may not assign its rights or obligations under this Agreement without the prior written consent of Jade.
The provisions of clause 3 of this Agreement shall survive the expiration or termination of this Agreement.
Do you need an older release?
JADE Github Repository offers additional resources you may find useful; for example:
- JADE-Erewhon – A demonstration system showcasing the various features and best practices of JADE development.
- Container examples – Various examples that show how to use JADE containers to stand up a variety of application environments.
- JADE-ATCG – Automated Test Code Generator for JADE GUI applications.
- JADE-Google-Analytics – A demonstration of JADE's Google Analytics integration - and more!
If you have hit a snag in your download or install we recommend:
We offer different support options depending on your needs and platform usage; take a look at the Support page for more details.