Semantics and the Evolution of Specialized Languages
he semantic web, or what is often called Web 3.0, is a collection of technologies that associate meaning with individual data elements that are usually embedded in XHTML files. Having
he semantic web, or what is often called Web 3.0, is a collection of technologies that associate meaning with individual data elements that are usually embedded in XHTML files. Having
ith the visual designer of Visual Studio 2005 it’s simple and straightforward to stir together a database connection, a SQL query, and a DataGridView control to get a Windows WYSIWYG
he first article in this series showed how to create custom configuration sections in your ASP.NET application configuration file, while the second article demonstrated using Windows Group Policy at both
indows services are applications that run in the background without the need for a user interface. If you?re using Windows, you should not be new to Windows services. The Themes
“The business market for this integration of data and programs is huge…. The companies who choose to start exploiting semantic web technologies will be the first to reap the rewards.”
he technologies of Message Transmission Optimization Mechanism (MTOM) and XML-Binary Optimized Packaging (XOP) are concerned with the fundamental issue of binary data transmission, which is of great importance to web
ost developers understand the value of the layered approach to architecture. The main principle behind layered architectures is that of “separation of responsibility”. Each layer is responsible for a finite
rrors and exceptionsare two similar notions that differ in one crucial aspect: exceptions are a runtime concept, whereas errors are anomalous conditions that can and should be detected as early
n Article 1 of this series, you saw how to create a custom configuration section in a Web.config file and access it using a custom provider. That solves the problem
As you know, the EJB container offers strong support for “save/load” the state of a stateful bean. The problem arises when you have to deal with nonserializable objects like open
This script was written to monitor a program whose process life was only a few seconds. It runs forever and only outputs that SQL which is generated by the program
This is in response to the original “Escape Sequences in .NET Resource Files, by Boris Eligulashvili. There is actually another way to insert escape sequences, such as newline characters—or actually
nterprise Application Integration (EAI) is a collection of architectural principles combined to integrate new and existing applications both within the enterprise and in business to business or partner integration scenarios.
any developers have started to warm to the power and simplicity of Ruby. While the language is simple and powerful, one of the hits against it has been the lack
he Asynchronous JavaScript and XML (AJAX) technology is notorious for making the user experience in web browsers more efficient, dynamic, and enjoyable and can minimize bandwidth usage. AJAX is based
y previous article discussed the new Application Settings feature in Windows Forms 2.0. The article demonstrated this feature using C#. However, the application settings feature is also available in Visual
his article describes one simple solution for achieving interoperability between Windows Workflow (WF) and ASP.NET. It leverages the power of WF’s powerful visual logic to design page-flow based on user
ften considered the backbone of service-oriented architectures (SOAs), the enterprise service bus (ESB) has emerged as a standard for enterprise-wide integration among disparate information systems. Many enterprise architects leverage the
When creating XML files, sometimes there are fields (elements/attributes) where you need to use special characters like space, &,
This tip shows you how to import an XML schema in your XSL pages, using XSLT 2.0. For example, if your XML schema is named schema.xsd and it is stored
Some of us may like to use the null layout instead of any ready layout manager. However, when it comes to using JscrollPane or other scrollable components, I’ve found that
SP.NET applications usually rely on two of the standard sections in a Web.config file: the section that holds general configuration and application values, and the section specialized for storing connection
T professionals agree that input is a big source of trouble. Input ultimately determines how applications work and wrong or malicious input may cause serious damage. It is extremely important
f you’ve ever worked on more than the most trivial installation program, you realize that developing installers isn’t for the faint of heart. After spending days or weeks learning about
icrosoft has recently announced the release of Windows Mobile 6 to device manufacturers. While it will be sometime before you can get your hands on a Windows Mobile 6 device,
uring the past 20 years I have had the privilege of working with well over 1,000 different software developers. Some of the best developers in the industry mentored me when
y previous article showed you how to improve your applications’ sophistication by using the power of ontologies to tap into conceptual information about a domain. This article discusses how to
s web application security breaches and attempts rise, developers are increasingly being asked to take more responsibility for the security of their applications, and application framework vendors are building more
he RichTextBox component in WPF/.NET 3.0 received a major upgrade compared to the previous version of the RichTextBox control that shipped with.NET 2.0. But with the expanded capability comes the
Query is a declarative language for querying XML that’s similar to SQL for querying relational data. Most Java developers are familiar with JDBC, which provides a standard Java API to