devxlogo

The Latest

Retrieve All Columns from Each Table in Every Database

This stored procedure retrieves all the columns of each table in every database. create procedure SP_GetAllColumnsFromAllDB/*———————————————————————- Procedure to retrieve columns of all the databases– Usage : exec SP_GetAllColumnsFromAllDB– Logic is:

Build a Reusable AJAX Class

Building a reusable AJAX class can help you eliminate some of the headaches when you’re starting out: Open a new file called connection.js and type the following lines in to

Convert Numbers to Excel Column Names

This algorithm converts column numbers (1-x) to Excel column names. It works for any number and does not have a limit. ‘————————————————–‘ Columns can be any number from 1 to

Give Your .NET Apps the Face They Deserve with WPF

icrosoft first publicly demonstrated Avalon way back in 2003 at the Professional Developers’ Conference (PDC) in Los Angeles. They touted Avalon as the next generation in user interface methodology, and

Programming Serial Ports Using Visual Basic 2005

isual Basic programmers who do networking programming will no doubt be familiar with the MSCOMM control in VB6. For those of us who followed VB’s progression to VB.NET, it was

Retrieve Records from a Supplied SQL Statement

To retrieve the required field from the table based on the supplied condition, use the following code: Function GetQueryResults(strSql As String, Optional ReadOnly As Boolean = True) _As Recordset Dim

Run Tomcat with a Security Manager

To run Tomcat with a security manager, you must add your own policy lines to the catalina.policy file?like when you build a SecurityManager. The catalina.policy file can be found here:

Finding a SQL Server Object

To find a SQL Server object, such as a user table, query the sysobjects system table in the local database. If the database name is unknown, use the following query:

Speed Up Your SQL Inserts

atabase performance is one of the most critical characteristics of almost any application, and for the developer or DBA it usually depends on how fast they can retrieve data. Hence,

Using Ink on the Web

he Tablet PC SDK makes it easy to get Ink onto your Web page, but then what? This article walks you through the easy part and then dives into some

Ruby—A Diamond of a Programming Language?

ave you heard about Ruby? It seems to be a popular topic in software development circles today. This language came to my attention at a Java conference last spring, where

Avoid Conflict when Using Dates

Suppose you have imported both java.util and java.sql packages into your program and you wish to use a Date class. This would create a conflict because both the packages have

Clear All the Controls in a Form

Use this code to clear all the controls in a form. ‘ Inputs : Frm – Form to clear’ All – If False, then only those controls whose TAGFIXED will

An Incremental Search in the .NET IDE

Suppose you want to search for the strings com, comment, and comments in your code. Press Ctrl + I and start typing. The .NET IDE will start searching as you

Book Excerpt: Python Essential Reference, 3rd Edition

ython is a stable general-purpose programming language used in nearly all application domains by companies such as Yahoo and Industrial Light and Magic. Python Essential Reference, 3rd Edition, is a

Ink Recognition and Ink Analysis

eing able to take handwritten notes or annotations is nice, but the real power of Tablet PCs comes from the ability to analyze and recognize handwriting written in digital Ink.

Passing Information Securely Between ASP and ASP.NET

ou can transfer information between systems using ASP.NET in multiple ways; however, many are cumbersome, complicated, or insecure. For example, many data transfer methods pass information in plain text, which

Tracking Memory Leaks in Java

Most “memory leaks” in Java are caused by references to objects that are no longer needed?if an object is still being referenced, then it cannot be finalized, and the memory

Selecting One Record Before and After a Value

Suppose you want to select records from a table (say orders from a Northwind database), before and after a certain value (orderid). For instance, one order before and after 10250.