J2EE and SQL Server: Making a JDBC Connection
QL Server may be the domain of Microsoft, but that doesn’t mean the database engine doesn’t know how to play nice with Java. In fact, SQL Server is used in
QL Server may be the domain of Microsoft, but that doesn’t mean the database engine doesn’t know how to play nice with Java. In fact, SQL Server is used in
n this follow-up to my January/February 2005 article, “The Baker’s Dozen: 13 Productivity Tips for Crystal Reports and .NET,” I’ll offer some changes to the original article and some new
he things that we tend to do poorly on software projects are also things that we tend to do often. These things also tend to be small enough to slide
am the host of “.NET Rocks!”, an Internet audio talk show for .NET developers online at www.dotnetrocks.com and msdn.microsoft.com/dotnetrocks. My co-host Richard Campbell and I interview the movers and shakers
n my first editorial, “Riding Waves” CoDe Magazine Mar/Apr 2002, I wrote about the concept of software waves and how software waves present opportunities to developers with the initiative to
bject/relational mapping (ORM)?in other words, persisting Java objects to a relational database?has become a major topic recently, thanks, in part, to a proliferation of advanced methods that attempt to make
n two of my earlier articles for DevX, “Teach Your Old Web Cam New Tricks: Use Video Captures in Your .NET Applications” and “Building an Enhanced Security System with a
DataTable supports the Find() and Select() methods for quick searching. But a faster way is to use a DataView with a sort column. DataView generates an index for a sorted
When a new process is created, the “subsystem” field in the executable file header determines whether it was linked as a console (also called CUI or “character-based”) or graphical user
Here’s how to open a folder using a keyboard shortcut in Windows 2000 Pro: Select the folder. Create a shortcut and place it on the desktop. Rightclick the new shortcut,
ompanies with big fleets of vehicles track fuel prices with manic single-mindedness?and for good reason! Drivers for Federal Express, UPS, DHL, and other delivery companies drive hundreds of millions of
As you probably know, an XPath 2.0 expression returns a sequence of items (nodes and atomic values). The following code shows you how to read from a sequence of items
ith Visual Studio 2005, developing Windows Forms applications has never been easier. In the user interface area, Microsoft has provided much of the needed functionality in the form of Windows
ava does not have a convenient way to treat a function as an object and then pass it around, but suppose it could. Say a function were an implementation of
fter four years of trying out every iteration of Web server application deployment that Microsoft created for .NET, ClickOnce has finally allowed me to succeed in deploying one particularly complex
anaging large amounts of data is always a challenge. Several major database vendors claim that their database engines are ready for terabytes of data, which is true to a certain
The functions in this tip find the greatest common divisor (GCD) or the least common multiple (LCM) of two given integers. Getting the GCD through recursion: int GCD(int x,int y)
If your site contains pure static HTML pages, you’ll have a tedious time entering the same header and footer HTML tags on all the pages. This is where JavaScript comes
This code outlines the main steps involved in using the Oracle Java XQuery API (OJXQI). If you are familiar with the DataDirectXQuery – XQuery for Java (DDXQ-XQJ), you may notice
To perform a case-insensitive string comparison, use the String.Compare function. One of this function’s overloaded methods has a third paramenter (boolean) which specifies whether a case should be ignored or
eronimo is built around an Inversion of Control (IoC) kernel that consumes and manages components called GBeans. The GBean framework is the vehicle by which new behaviors are added to
ith the popular adoption of AJAX techniques mushrooming on the web today, real-life security issues were sure to follow, as illustrated by the Yamanner and MySpace worms. The debate over
any factors influence application performance, but in essence, the most important is to be aware of how to optimize your applications so they consume the least amount of memory and
he Eclipse Standard Widget Toolkit (SWT) is growing in popularity, as evidenced by its use in applications like Azureus and RSSOwl. In this 10-minute solution, you will learn how to
To include special characters such as spaces and quotes in a URL string, you need to encode them. Similarly, you need to decode encoded characters in a URL to recover
ADO.NET generates indexes on the primary key(s). So, if you have to search a datatable for records based on some primary key value, use DataTable.Rows.Find() instead of DataTable.Select(). The Find
When a JavaScript error occurs in IE, it shows a popup message asking whether you want to continue the script (if you’ve disabled this popup window, the error notification shows
hy are so many articles and books written about development methodologies? I believe it’s because improving the efficiency of a development team is a never-ending battle. Technology keeps changing and
nput validation is something that every program needs, and every programmer dreads. Most developers craft hard-coded program logic to verify that a phone number consists of 7 or 10 digits;
num types have been a valuable asset in the arsenal of C++ programmers for many years. However, their current specification has some security loopholes that can lead to bugs and