{"id":390,"date":"2016-12-24T20:18:16","date_gmt":"2016-12-25T01:18:16","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=390"},"modified":"2016-12-24T20:18:16","modified_gmt":"2016-12-25T01:18:16","slug":"eurekalog","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/","title":{"rendered":"Eurekalog debugs your deployed application."},"content":{"rendered":"<h3 style=\"text-align: center;\">Eurekalog debugs your deployed application.<\/h3>\n<p><a href=\"https:\/\/www.eurekalog.com\/details_delphi.php\" target=\"_blank\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"391\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/mainscreenshotsmall\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&amp;ssl=1\" data-orig-size=\"594,485\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"MainScreenshotSmall\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=300%2C245&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&amp;ssl=1\" class=\"aligncenter wp-image-391 size-medium\" title=\"Eurekalog\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?resize=300%2C245&#038;ssl=1\" alt=\"Eurekalog\" width=\"300\" height=\"245\" srcset=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?resize=300%2C245&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?w=594&amp;ssl=1 594w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Eurekalog has\u00a0consistently proven that they assist developers in debugging deployed applications. \u00a0No kidding, Eurekalog will send back a detailed report to the developer informing them exactly where the bug occurred and what exactly happened. \u00a0Baron Software has implemented in all of their applications the Eurekalog method and recommend to all Delphi developers to implement it as well.<\/p>\n<h2 style=\"text-align: center;\">Eurekalog Features<\/h2>\n<p>Features that should convince you to purchase the Eurekalog applcation:<\/p>\n<ul>\n<li>Detailed bug report about each exception, leak or hang;<\/li>\n<li>Bug report includes call stack with unit names, class names, routine names, and line numbers;<\/li>\n<li>Extensive run-time and environment information is logged into bug report;<\/li>\n<li>RAW dump and disassembly information;<\/li>\n<li>Easy integration, no need to write code;<\/li>\n<li>No additional files needed (no DLLs, no .map files, no .tds files);<\/li>\n<li>Packing and encryption of all information;<\/li>\n<li>No performance loss (unless exception occurs);<\/li>\n<li>Full unicode support;<\/li>\n<li>Win32 and Win64 support;<\/li>\n<li>VCL, CLX, FMX (FireMonkey) support;<\/li>\n<li>Supports any application kind: GUI, CGI, WinCGI, ISAPI, IntraWeb, COM, Multi-Thread, etc.;<\/li>\n<li>Full support for .exe packers and protectors;<\/li>\n<li>Support for modern cutting-edge features (nested exceptiond, Wait Chain Traversal, etc.);<\/li>\n<li>Easy and powerfull customization;<\/li>\n<li>Many helper tools;<\/li>\n<li>Sending bug report to developers (e-mail, HTTP, FTP, bug trackers);<\/li>\n<li>SSL\/TLS support for all send methods;<\/li>\n<\/ul>\n<h2 style=\"text-align: center;\">\nNew Partnership with Gnostice<\/h2>\n<p>The Eurekalog subscription model is recommended to allow the Delphi developer to keep up with the latest updates . \u00a0Eurekalog is announcing a new partnership with Gnostice, the makers of XtremeDocumentStudio, a document-processing and PDF library compatible with Delphi and other languages. Eurekalog will\u00a0begin offering a 25% discount coupon on XtremeDocumentStudio to any registered EurekaLog customer.<\/p>\n<p><strong>Gnostice XtremeDocumentStudio Delphi [25% Off]<\/strong><br \/>\nGnostice XtremeDocumentStudio Delphi is a suite of multi-format document processing components for VCL and FMX. You can View, Print, Convert PDF, DOCX, DOC, RTF, BMP, JPEG, PNG, WMF, EMF and images, OCR images to searchable PDF, and much more.<\/p>\n<p>Call Eurekalog today and get the Gnostice tool as well. \u00a0This is a \u00a0win-win for all Delphi developers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eurekalog debugs your deployed application. &nbsp; Eurekalog has\u00a0consistently proven that they assist developers in debugging deployed applications. \u00a0No kidding, Eurekalog will send back a detailed report to the developer informing them exactly where the bug occurred and what exactly happened. \u00a0Baron Software has implemented in all of their applications the Eurekalog method and recommend to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-390","post","type-post","status-publish","format-standard","hentry","category-sql-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Eurekalog debugs your deployed application. - Baron Software<\/title>\n<meta name=\"description\" content=\"Eurekalog, Debugs, deployed applications\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eurekalog debugs your deployed application.\" \/>\n<meta property=\"og:description\" content=\"Baron Software has implemented in all of their applications the Eurekalog method and recommend to all Delphi developers to implement it as well.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-25T01:18:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"594\" \/>\n\t<meta property=\"og:image:height\" content=\"485\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Eurekalog debugs your deployed application.\" \/>\n<meta name=\"twitter:description\" content=\"Baron Software has implemented in all of their applications the Eurekalog method and recommend to all Delphi developers to implement it as well.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Eurekalog debugs your deployed application.\",\"datePublished\":\"2016-12-25T01:18:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/\"},\"wordCount\":337,\"publisher\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall-300x245.png\",\"articleSection\":[\"SQL Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/\",\"name\":\"Eurekalog debugs your deployed application. - Baron Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall-300x245.png\",\"datePublished\":\"2016-12-25T01:18:16+00:00\",\"description\":\"Eurekalog, Debugs, deployed applications\",\"breadcrumb\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&ssl=1\",\"width\":594,\"height\":485,\"caption\":\"Eurekalog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.baronsoftware.com\/Blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Eurekalog Debugs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#website\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\/\/www.baronsoftware.com\/Blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Eurekalog debugs your deployed application. - Baron Software","description":"Eurekalog, Debugs, deployed applications","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/","og_locale":"en_US","og_type":"article","og_title":"Eurekalog debugs your deployed application.","og_description":"Baron Software has implemented in all of their applications the Eurekalog method and recommend to all Delphi developers to implement it as well.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/","og_site_name":"Baron Software","article_published_time":"2016-12-25T01:18:16+00:00","og_image":[{"width":594,"height":485,"url":"https:\/\/i1.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&ssl=1","type":"image\/png"}],"author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"Eurekalog debugs your deployed application.","twitter_description":"Baron Software has implemented in all of their applications the Eurekalog method and recommend to all Delphi developers to implement it as well.","twitter_image":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&ssl=1","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Eurekalog debugs your deployed application.","datePublished":"2016-12-25T01:18:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/"},"wordCount":337,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall-300x245.png","articleSection":["SQL Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/","url":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/","name":"Eurekalog debugs your deployed application. - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall-300x245.png","datePublished":"2016-12-25T01:18:16+00:00","description":"Eurekalog, Debugs, deployed applications","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/12\/MainScreenshotSmall.png?fit=594%2C485&ssl=1","width":594,"height":485,"caption":"Eurekalog"},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/eurekalog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Eurekalog Debugs"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-6i","jetpack-related-posts":[{"id":808,"url":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/","url_meta":{"origin":390,"position":0},"title":"Latest uTorrent bug can control your computer to steal downloads","author":"richard@baronsoftware.com","date":"February 24, 2018","format":false,"excerpt":"Latest uTorrent bug can control your computer to steal downloads Two versions of uTorrent, one of the Internet's most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher. uTorrent developers\u2026","rel":"","context":"In &quot;News Items&quot;","block_context":{"text":"News Items","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/news-items\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1197,"url":"https:\/\/www.baronsoftware.com\/Blog\/why-choose-delphi-for-rapid-application-development\/","url_meta":{"origin":390,"position":1},"title":"Why Choose Delphi for Rapid Application Development","author":"richard@baronsoftware.com","date":"December 13, 2024","format":false,"excerpt":"Delphi is a rapid application development IDE that shortens time for designing and implementing an application for various platforms. Some of the highlights A visual design interface. Fast compilation speeds Strong database integration. A mature component library (VCL). Its ability to maintain legacy systems. Delphi can create high-performance applications with\u2026","rel":"","context":"In &quot;Rad Studio Delphi Development&quot;","block_context":{"text":"Rad Studio Delphi Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/rad-studio-embarcadero-delphi-development\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":52,"url":"https:\/\/www.baronsoftware.com\/Blog\/visual-basic-6-still-strong-after-all-of-these-years\/","url_meta":{"origin":390,"position":2},"title":"Visual Basic 6 still strong after all of these years.","author":"richard@baronsoftware.com","date":"December 30, 2014","format":false,"excerpt":"The death of Microsoft Visual Basic 6 has been tremendously exaggerated as the saying goes.\u00a0 VB6 is still used as of today by developers that find it easy to use and can develop a quick 32 bit Windows application.\u00a0 The issues that pertain to VB6 are components that are no\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":127,"url":"https:\/\/www.baronsoftware.com\/Blog\/software-development-planning-or-how-not-to-have-a-project-from-hell\/","url_meta":{"origin":390,"position":3},"title":"Software Development planning or how not to have a project from Hell!","author":"richard@baronsoftware.com","date":"July 4, 2015","format":false,"excerpt":"Recently I was given an assignment to develop an Android application and the agreement to the price was based on the client's budget which sometimes you get what you agreed to. What I would like to do with this posting is give young software developers guidelines on how to forge\u2026","rel":"","context":"In &quot;Software development Concepts&quot;","block_context":{"text":"Software development Concepts","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-development-concepts\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1211,"url":"https:\/\/www.baronsoftware.com\/Blog\/why-the-hate-for-microsoft-access\/","url_meta":{"origin":390,"position":4},"title":"Why is there the hate for Microsoft Access and Excel ?","author":"richard@baronsoftware.com","date":"January 20, 2025","format":false,"excerpt":"During a recent question that was published by a developer. they were requesting how to convert and import Paradox tables into Microsoft Access. When all of a sudden there was a huge amount of hate towards Microsoft Access and Excel. The responses were overwhelming about the evils from these two\u2026","rel":"","context":"In &quot;Rad Studio Delphi Development&quot;","block_context":{"text":"Rad Studio Delphi Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/rad-studio-embarcadero-delphi-development\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2025\/01\/database-management-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2025\/01\/database-management-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2025\/01\/database-management-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2025\/01\/database-management-1.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2025\/01\/database-management-1.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":766,"url":"https:\/\/www.baronsoftware.com\/Blog\/skype-cant-fix-nasty-security-bug-without-massive-code-rewrite\/","url_meta":{"origin":390,"position":5},"title":"Skype nasty security bug without a massive code rewrite","author":"richard@baronsoftware.com","date":"February 15, 2018","format":false,"excerpt":"Skype nasty security bug without a massive code rewrite There is a major flaw or simply a bug within the Skype application during the update process.\u00a0 The security of your system can allow an attacker to gain system-level privileges to a vulnerable computer. You can review the comments by clicking\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=390"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/390\/revisions"}],"predecessor-version":[{"id":392,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/390\/revisions\/392"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}