Suppress Logs from Libraries
How many times have you tried to get rid of the intrusive log messages from the API you’re using? The solution is easy: in your log4j configuration file, just include
How many times have you tried to get rid of the intrusive log messages from the API you’re using? The solution is easy: in your log4j configuration file, just include
f you are among those enterprise developers routinely facing the tasks of processing large XML files whose sizes range from tens to hundreds of megabytes, most likely you have used
t’s common in imaging applications for images to be displayed at different sizes. If such images are annotated with Ink, it’s necessary for the Ink to be scaled to the
f you are a part of a small business, either you or someone at your organization likely deals with QuickBooks. QuickBooks is the most broadly used accounting software in the
ll but the simplest applications store data in a central location and access it over a network. However, in many scenarios, distributed applications cannot assume a certain kind of network
s of version 2.0, JAX-RPC has been renamed JAX-WS. But the change is not in name alone. JAX-WS offers simplified development, better platform and language independence, and an end to
2EE developers working in a standard lifecycle model often face challenges in managing deployment descriptors for the different lifecycle stages. In larger J2EE development environments where IT governance is an
oma Somasegar, Microsoft’s Vice President for Development technologies kicked off the winter session of VSLive! in San Francisco Monday, with little news but a lot of enthusiasm for both recently
he pressure is on for IT to deliver applications that can change on a dime?evolving as quickly as the business evolves even in the face of uncertain requirements. To address
When you use System.out.println( ) by passing an object as an argument, the JRE invokes its toString( ) method by default. If you haven’t overridden this method, then you end
icrosoft SQL Server 2005 Reporting Services (SSRS) provides open protocols for integrating reporting clients regardless of the targeted programming language and platform. A noticeable missing piece in its integration strategy
Ever forgot to un-share a folder that you shared with a colleague or friend? Ever forgotten the path of a folder that you shared? Want to know who has opened
This example retrieves items in a list that have been checked and simply outputs them to the Output window. Assume the list has been bound to a DataSource, like a
One of the most common errors while porting from 32-bit Code to a 64-bit code is in the use of Math.h library functions. Suppose you use a call to the
irtual machines can cut time and money out of the software development and testing process, but they aren’t the best choice in every scenario. When should you use virtual machines
uppose you have to deploy a highly available and scalable database backend solution for an Internet application (similar to what is described here). A cluster immediately comes to mind. A
ecurity threats are an ever-present concern when using the Internet. Something as simple as browsing the Internet can introduce malware into a machine. Firewalls, antivirus, and antispyware software and good
id you ever notice how IT trends tend to be cyclical, mirroring trends in clothing styles and television shows? Women are wearing bell-bottoms again and we’re watching a lot of
lthough microcomputer operating systems have made huge strides since the early CP/M and DOS days, they originally evolved under the basic idea that each computer would be loaded with a
y organization has been using VMware and Xen virtualization products for a few years for several purposes, including testing of new software configurations, development, and consolidation of production servers. We
irtual PCs are extremely useful for development, testing, and setting up deployments that require applications to be isolated from one another. During the past year or so, I’ve built more
n a world of multiple operating systems, each with various versions, no developer has the luxury of building applications for only one target configuration. Every developer needs to ensure that
ML, Arrays, DataSets, database tables, collections of all types?all these have a common attribute; they are data stores that hold sets of data values or objects grouped together for some
f you are familiar with development on PCs using Microsoft’s tools, you already know most of what you need to develop for Tablet PCs. The main addition in the Tablet
recall my first laptop computer. During my first year of college, I purchased an NEC laptop from my college advisor, Art Sanchez. This computer was sweet. Here’s the list of
Welcome to the CoDe Magazine Focus issue on Tablet PC and Mobile PC application development. On behalf of the Mobile PC Business Unit at Microsoft (see Figure 1), I’d like
ibernate is a practical, high-performance Java persistence framework. Using Hibernate is nearly transparent, but the one detail that even Hibernate can’t hide is the notion of object identity and equality.
s the holiday season wraps up, many of you might have received new cell phones, PDAs, or other electronic gadgets. Many are probably equipped with J2ME. The ever-increasing capabilities in
Suppose you have a button that uses a Default property (set to true) and are editing text in a multiline text box on the same form. When you press the
When you’re freeing memory, remember to set the memory contents to 0 so no other malicious program can read it after it’s been freed. //For example#define DATA_SIZEBOOL function(){ char pszData