DelphiInterviewTech Partner

Alister Christie And Serge Pilko Talk Delphi, Part 2 of 3: Farms And Books

On 12 January Serge Pilko, Embarcadero MVP and founder of Softacom, a world leading Delphi software development services and software solutions provider, published a video of his interview with Alister Christie, author of the legendary “Code Faster in Delphi” and the creator of hundreds of videos that have shown many of today’s Delphi developers around the world how to program and…
Read more
DelphiIDERAD Studio

Grab Your HUGE Delphi Anniversary “Innovation Timeline” Infographic!

Are you interested in seeing how your preferred programming language has progressed over time and what additional innovations it has enabled? Is Delphi tearing your curly brackets apart, or has C# sharpened your skills? Do you remember the various phones you’ve had throughout the years? Are you an Android phone fanatic or an Apple aficionado? When Candy Crush was first released, what Android…
Read more
How-To'sNewsProductivity

Top 10 How-To’s: Modernization

Application modernization, also known as legacy modernization, involves updating existing software and its features to benefit from technological advances and maintain performance. Modernization can involve making apps cloud-native to lower cost and increase scalability and…
DelphiHow-To'sNewsProductivityRAD Studio

Top 10 How To's: RAD Studio

RAD Studio 11 Alexandria comes with a wealth of new super features to boost your productivity and give you access to new services and advances capabilities. The best new features include support for High-DPI 4k screens, provisioning for Windows 11, design-time views of styles, and much more. Here are our 10 favorite picks for getting things done in RAD Studio. 1. How to Use New Platform…
Read more
News

Storing Enterprise Data on Mobile: How to Identify And Manage The Security Risks

Storing data on-device for apps on mobile is a practical and efficient way to manage data. However, it can present a number of security risks, both for data at rest and for data in transit. This is especially acute given that mobile devices wander with their owner everywhere, can be stolen or hacked, and vital data can be lost. The Full Impact of a Data Breach The real cost of a data breach can…
Read more