Estel Tech Blog



Estel Tech Anywhere Tips, Tricks, & Techniques: The Signature Capture Control

Web applications programming tutorial Hot off the press from Estel Tech Anywhere training partner Twin Peaks Research is the first video of their series "Estel Tech Anywhere: Tips, Tricks & Techniques" Each week, the expert instructors at Twin Peaks Research take an in depth look a newEstel Tech Anywhere feature, helping make your mobile web applications programming quicker and easier. The "Tips, Tricks & Techniques" series is offered as a year long video subscription that:
  1. Describes an undocumented or difficult but important feature/capability of Estel Tech Anywhere
  2. Explains why the feature/capability is important
  3. Shows you how to apply it

For the first video in the series, master instructor Max Hammond tackles the Signature Capture Control, which gives you the ability to easily capture a signature and store the signature in a database.

With Estel Tech Anywhere, we are constantly bringing our users new and exciting features and functionality for developing secure, enterprise-level mobile business apps.

Prev Post Image
Estel Tech Anywhere Offline Applications - Demo
Next Post Image
New in Estel Tech Anywhere: PhoneGap Document Handler Plugin

About Author

Default Author Image
Chris Conroy

Chris Conroy runs digital programs for Estel Tech.


The Estel Tech platform is the only unified mobile and web app development and deployment environment with distinct “no-code” and “low-code” components. Using the Estel Tech Transform no-code product, business users and developers can take full advantage of all the capabilities of the smartphone to turn any form into a mobile app in minutes, and power users can add advanced app functionality with Estel Tech Transform's built-in programming language. IT developers can use the Estel Tech Anywhere low-code environment to develop complex web or mobile business apps from scratch, integrate data with existing systems of record and workflows (including data collected via Estel Tech Transform), and add additional security or authentication requirements to protect corporate data.

Comment