devxlogo

The Latest

The Remove_if() Algorithm

If you are familiar with the remove_if() algorithm, you’re used to applying remove_if() followed by erase(). For example, suppose you’re given a predicate to determine whether a number is even:

Resolve DB2 Instance Creation Failure on UNIX

On AIX, and UNIX in general, DB2 instance creation fails with vague errors: Update DBM cfg SYSADM_GROUP errcode = 8DBI1281E The database manager configuration file could not be initialized. Explanation:

Extract JAR and ZIP Entries with JarURLConnection

Use the following code to extract JAR and ZIP Entries with JarURLConnection: import java.net.*;import java.io.*;import java.awt.*;import java.util.*;import java.util.jar.*;class read extends Frame{URL url=null;JarURLConnection URLcon=null;JarFile jar=null;TextArea TA=new TextArea(15,35);public read(String titlu){ super(titlu);}void init(){

Combine Multiple .NET Assemblies into One

You can use Microsoft’s ILMerge tool to merge .NET assemblies?even those written in different .NET languages?into a single assembly for easier distribution, something that’s not possible using Visual Studio alone.

Custom Web Controls Demystified, Part 1

hen ASP.NET was released in 2002, it gave Web developers a whole new design paradigm to work with; one that varied greatly from the classic Active Server Pages (ASP) that

Comparing Strings Properly in Java

The semantics of ==, with regards to string comparison in Java and C#, are totally different from each other. Suppose you have two strings?s1 and s2?and the following statment: //

Converting a String to a GUID

There is a simple way to convert a string, which is in the correct GUID format, into a GUID. Simply do the following: GUID GUID = (SqlGUID.Parse(s)).Value; Related Posts Ron

Top 10 Tips for Designing Telephony Applications

here’s a strong chance that you’ve used a speech-based application at least once?to access your bank information, check the status of an airline flight, or get the latest weather?because the

Using the New Security Controls in ASP.NET 2.0

SP.NET 2.0 comes with several new security controls located under the Login tab in the Toolbox (see Figure 1) that greatly simplify the life of a Web developer. Using the

Make Location Aware Apps Part of the Grind with BREW

hile Qualcomm BREW has had support for location-based services (LBS) applications since its inception, only recently have CDMA carriers begun to roll out the back-end support these applications need. Consequently,

Book Excerpt: “Expert Oracle PL/SQL”

xperienced PL/SQL programmers and Oracle developers will learn to master Oracle’s procedural extension to industry-standard SQL. “Expert Oracle PL/SQL” should help you become expert at developing robust, high-performance enterprise applications

Add Object Cache Monitoring Using JMX and Aspects

ike many companies, my company uses an object cache to store frequently accessed data in memory so the server doesn’t have to access the back-end database every time it handles

A Loop with an Exit Condition

Here is a pattern you will see quite often when structuring your code in loop constructs: 01 enum command { start, stop, wait, quit };02 command instructions;03 int counter =

Closing a Popup Window Automatically

The following code will close a popup window after the user selects to download the file, or if he/she cancels the download. Between the tags of the document is popped

Find All User Tables, Columns, DataTypes, and Length

To determine all your user tables, plus their columns, datatypes, and length, type: SELECT DISTINCT SO.Name AS “TableName”, SC.ColID, SC.Name AS “ColumnName”, ST.Name AS “DataType”, SC.Length AS “Length”, SC.Status AS