Alpha Software Blog



Alpha Anywhere Tips, Tricks, & Techniques: The Signature Capture Control

Web applications programming tutorial Hot off the press from Alpha Anywhere training partner Twin Peaks Research is the first video of their series "Alpha Anywhere: Tips, Tricks & Techniques" Each week, the expert instructors at Twin Peaks Research take an in depth look a newAlpha Anywhere feature, helping make your mobile web applications programming quicker and easier. The "Tips, Tricks & Techniques" series is offered as a year long video subscription that:
  1. Describes an undocumented or difficult but important feature/capability of Alpha Anywhere
  2. Explains why the feature/capability is important
  3. Shows you how to apply it

For the first video in the series, master instructor Max Hammond tackles the Signature Capture Control, which gives you the ability to easily capture a signature and store the signature in a database.

With Alpha Anywhere, we are constantly bringing our users new and exciting features and functionality for developing secure, enterprise-level mobile business apps.

Prev Post Image
Alpha Anywhere Offline Applications - Demo
Next Post Image
New in Alpha Anywhere: PhoneGap Document Handler Plugin

About Author

Default Author Image
Chris Conroy

Chris Conroy runs digital programs for Alpha Software.


The Alpha platform is the only unified mobile and web app development and deployment environment with distinct “no-code” and “low-code” components. Using the Alpha TransForm no-code product, business users and developers can take full advantage of all the capabilities of the smartphone to turn any form into a mobile app in minutes, and power users can add advanced app functionality with Alpha TransForm's built-in programming language. IT developers can use the Alpha Anywhere low-code environment to develop complex web or mobile business apps from scratch, integrate data with existing systems of record and workflows (including data collected via Alpha TransForm), and add additional security or authentication requirements to protect corporate data.

Comment