devxlogo

The Latest

Heard on .NET Rocks! Moving VB6 Applications to .NET

am the host of “.NET Rocks!”, an Internet audio talk show for .NET developers online at www.dotnetrocks.com and msdn.microsoft.com/dotnetrocks. My co-host Richard Campbell and I interview the movers and shakers

Surfs Up!

n my first editorial, “Riding Waves” CoDe Magazine Mar/Apr 2002, I wrote about the concept of software waves and how software waves present opportunities to developers with the initiative to

Master the New Persistence Paradigm with JPA

bject/relational mapping (ORM)?in other words, persisting Java objects to a relational database?has become a major topic recently, thanks, in part, to a proliferation of advanced methods that attempt to make

Monitor Your Web Cam from a Remote Computer

n two of my earlier articles for DevX, “Teach Your Old Web Cam New Tricks: Use Video Captures in Your .NET Applications” and “Building an Enhanced Security System with a

A Faster Way to Search Through a DataTable

DataTable supports the Find() and Select() methods for quick searching. But a faster way is to use a DataView with a sort column. DataView generates an index for a sorted

Read from a Sequence of Items in Saxon 8

As you probably know, an XPath 2.0 expression returns a sequence of items (nodes and atomic values). The following code shows you how to read from a sequence of items

Customize and Extend Windows Forms Controls

ith Visual Studio 2005, developing Windows Forms applications has never been easier. In the user interface area, Microsoft has provided much of the needed functionality in the form of Windows

SQL Simplicity for Java Value Mapping

ava does not have a convenient way to treat a function as an object and then pass it around, but suppose it could. Say a function were an implementation of

ClickOnce for the Real World, Not Hello World

fter four years of trying out every iteration of Web server application deployment that Microsoft created for .NET, ClickOnce has finally allowed me to succeed in deploying one particularly complex

Designing High Performance Stored Procedures

anaging large amounts of data is always a challenge. Several major database vendors claim that their database engines are ready for terabytes of data, which is true to a certain

Find Common Denominators in C++

The functions in this tip find the greatest common divisor (GCD) or the least common multiple (LCM) of two given integers. Getting the GCD through recursion: int GCD(int x,int y)

Use Javascript Templates in Static HTML Pages

If your site contains pure static HTML pages, you’ll have a tedious time entering the same header and footer HTML tags on all the pages. This is where JavaScript comes

How to Use Oracle Java XQuery API

This code outlines the main steps involved in using the Oracle Java XQuery API (OJXQI). If you are familiar with the DataDirectXQuery – XQuery for Java (DDXQ-XQJ), you may notice

Use String.Compare to Compare Case-insensitive Strings

To perform a case-insensitive string comparison, use the String.Compare function. One of this function’s overloaded methods has a third paramenter (boolean) which specifies whether a case should be ignored or

Exploring Geronimo’s GBean Framework

eronimo is built around an Inversion of Control (IoC) kernel that consumes and manages components called GBeans. The GBean framework is the vehicle by which new behaviors are added to

Inherent AJAX Security with Java and JSF

ith the popular adoption of AJAX techniques mushrooming on the web today, real-life security issues were sure to follow, as illustrated by the Yamanner and MySpace worms. The debate over

Using the URLEncoder/URLDecoder Classes

To include special characters such as spaces and quotes in a URL string, you need to encode them. Similarly, you need to decode encoded characters in a URL to recover

Using Firefox’s JavaScript Console

When a JavaScript error occurs in IE, it shows a popup message asking whether you want to continue the script (if you’ve disabled this popup window, the error notification shows

Exploring Secrets of Windows Form Validation

nput validation is something that every program needs, and every programmer dreads. Most developers craft hard-coded program logic to verify that a phone number consists of 7 or 10 digits;

Safeguard Your enums: Make Them Strongly-Typed

num types have been a valuable asset in the arsenal of C++ programmers for many years. However, their current specification has some security loopholes that can lead to bugs and