Code Access Security: When Role-based Security Isn’t Enough
sk any typical .NET developer about Code Access Security (CAS) and you’ve got the chance of hearing “Huh?” as the response. Most developers haven’t run into CAS at all?let alone
sk any typical .NET developer about Code Access Security (CAS) and you’ve got the chance of hearing “Huh?” as the response. Most developers haven’t run into CAS at all?let alone
Suppose you have a DataGrid with several columns full of data. The DataGrid contains several pages. You can disable paging and export all the data to Excel using the RenderControl
ood programmers are what make a software company. Not just good programmers, mind you, they have to be great hackers, rock stars, the best. Great hackers are three times, five
Very few alternatives are available to someone wanting to generate RTF documents using Java. The best and easiest way is to use the iText third-party freeware library. Just plug in
This script displays all your table names—along with their column names, data types, data lengths, and null/not null information in a database. SELECT Sysobjects.name AS TABLE_NAME, syscolumns.Id, syscolumns.name AS COLUMN_NAME,systypes.name
ver since the 4.0 browsers were released, cross-browser dynamic HTML libraries have proliferated as a simple matter of necessity. Any developer who wants to take advantage of the latest and
he Ajax.NET Framework presents a remarkably easy-to-use framework that will simplify Ajax development and allow developers to spend more time on implementation details and less time on parsing XML. If
must confess, 2005 was an odd year. Perhaps you remember a column a few months back, describing the wretched flight with four cats and an ill seatmate, moving the household
ast month I had some developers over to my office house to do a code review of a project they had developed for a client. During the review one of
ome time ago, I posted a blog entry entitled, “Refactor as you Develop.” I did so because a buddy of mine out in Chicago was stuck in Refactor hell, as
am the host of “.NET Rocks!”, an Internet audio talk show for .NET developers online at www.dotnetrocks.com and msdn.microsoft.com/dotnetrocks . My co-host Richard Campbell and I interview the movers and
o matter how well you write and understand high-level programming languages, your applications can probably benefit if you’re willing to dig down into the lower-level code that makes the computer
he way a typical three-tier architecture separates the concerns of data-management logic, business logic, and presentation logic makes clustering, the practice of deploying a single application on multiple machines, a
he DOM 3.0 Validation specification provides for validation of an XML document with a DTD or an XML Schema. The advantage of DOM 3.0 Validation over validation with a validating
Although GO is not a T-SQL statement, it is often used in T-SQL code and unless you know what it is it can be a mystery. So what is its
Adding an existing Windows Form in VS.Net 2003 means adding two files?for example, a MyForm.cs file with C# code and an XML-based MyForm.resx assembly resource file. In VS.Net 2005, there
The NumberReverse class helps to reverse a given number using int variables: public class NumberReverse { public static void main(String args[]) { // enter the number to reverse eg., 5467
n classic Gang of Four book. Similarly, the term “algorithm” used in this context refers to the implementation of an ordinary member function, not the generic algorithms of STL. Redesign
isual Studio 2005 has great support for building Windows Mobile applications such as Pocket PC and Smartphone applications. But what happens after an application is completed and ready to be
uby is an object-oriented, metaprogramming language that has garnered a lot of attention in software development circles as of late. Metaprogramming is a means of writing software programs that write
ablet PC and Mobile PC development is very popular today, and will only get more popular and important in the future. For Mobile PC developers, there are significant changes coming
he ability to store items in memory the first time they are requested?whether data objects, pages, or parts of a page?is one of the most important factors in building high-performance,
Use this code to implement a proxy selector class in the Tiger release of Tiger: import java.net.*;import java.util.*;import java.io.*;public class MyProxySelector extends ProxySelector{ //implement the select method public List select(URI
Developers generally tend to use characters such as % as a delimiter for storing data in an Oracle database. But because Oracle views the % character as a Wildcard character,
If you’ve struggled with setting static variables in MouseDown, and MouseUp commands to enable users to drag borderless windows around the screen, here’s a simpler way: If Button = False
ybase iAnywhere’s RFID Anywhere is a middleware software platform built on the .NET platform that simplifies every phase of radio frequency identification (RFID) projects, including development, deployment, and ultimately the
adio frequency identification (RFID) is an enabling technology. By itself, RFID doesn’t provide much value, but it does enable companies to develop applications that create value. RFID describes systems that
he Palm Treo platform has gained wide appeal as a communications device for mobile professionals, enjoying several launches in the enterprise over the last few months. With the wide use
he importance of enabling your software to identify the current network connections and change behavior has never been greater, as more people use laptops, notebooks, and Tablet PCs. With the
riting consistently clear, high quality, maintainable code is an art that requires a certain amount of discipline at the best of times. Coding standards lay out rules and recommendations about