The cost of crossing the line

Rad Studio Delphi Development
Informing employees about company standards With the pandemic still raging across the world it seems that folks have way too much time on their hands. Decisions made by individuals at the time seem like a justified method. When in reality they could be harming others, breaking the law and tarnishing the company's image. Employees need to know when how far they can protest before they cross the line. The line is not physical but in reality you represent the company you work for. That decision was made upon hiring you. Acts that cannot be taken back There has been stories due to the social unrest that places a company in a position that they cannot turn away from. Some act such as: Capitol riots where selfies were taken.Riots where violence…
Read More

Steps for a successful code review

Computer PC Tips - bits and bytes, Rad Studio Delphi Development, Software development, Software development Concepts
Successful programming teams always have followed department or company guidelines on how code reviews should be done. Technical specifications provide the programmer the initial steps for application development. Excellent specifications provide insight on libraries and APIs. The coding standards should be part of this document. Preparing for a code review Self checking items: What are the company policies ?Did you follow company coding standards ?Have you read the company guidelines ?Did the code successfully compile ?Was testing successful ?Check for duplicate code or very large functions and procedures. These steps should be adhere to by any programmer. Code should be formatted and indented. Comments listed at the top of the module providing a brief description along with update history. You must be able to accept any type of criticism. This…
Read More
What to do if you get Acecore couldn’t start last time.

What to do if you get Acecore couldn’t start last time.

Microsoft Development, Rad Studio Delphi Development, Software development
Sometimes you wonder about Microsoft and their wisdom on older applications that still work. Due to a recent Office Update, applications that use Microsoft Access as a backend database received the message "Acecore couldn't start last time". This file is part of the Microsoft Office system. ACECORE.DLL is developed by Microsoft Corporation. It’s a system and hidden file. ACECORE.DLL is usually located in the %PROGRAM_FILES% sub-folder and its usual size is 1,751,904 bytes. Somehow there was an update to the office application that damaged it. The following are steps you can take to repair it so the message cannot be displayed any longer. Go to any Office Application.Click AccountClick Update Allow office to perform the latest updates to repair any broken feature. Wait for the successful completion and then attempt to start…
Read More

H-1B Visas help or hurt

Rad Studio Delphi Development
American Worker or Outsource Worker What is the H-1B Visa progam The H-1B visa program allows companies in the United States to temporarily employ foreign workers. This could be in occupations that require the knowledge. A Bachelor's degree or higher in the specific specialty, or its equivalent. A foreign worker with an H-1B visa can stay in the U.S. for a maximum of six years. The H-1B visa and status is initially valid for three years and can then be extended for another three years. Obtaining an H-1B visa, which is allocated through a lottery system, has become increasingly hard in the past few years. The Department of Homeland Security currently caps the amount of H-1B visas. 65,000 per fiscal year, with an additional 20,000 reserved for applicants with advanced degrees. The benefits of the H-1B visa are supposed to assist companies…
Read More

Being Secured Against Hackers and Criminals dealing with Covid-19 and other viruses

Rad Studio Delphi Development
Cyber threats are real. Everyone is being attacked on a daily basis from outside agents. These agents for the most part have criminal intent on using the Covid-19 fear. You must be on guard against emails that have attachments. User email accounts, contact information or even companies are used to fake a person into thinking the email is from someone they know. You must check the actual email address where the item came from. For the most part an email could come from an insurance company or finance house. The hacker will show the company logo but the email address has a fake domain. Security Steps 1. Install and maintain anti-virus software. One recommendation is Norton Security which will scan for a wide range of threats, but no one program…
Read More