What Does “strictfp” Do?”
When this modifier is specified, the JVM sticks to the Java specifications and returns the consistent value independent of the platform. That is, if you want the answers from your
When this modifier is specified, the JVM sticks to the Java specifications and returns the consistent value independent of the platform. That is, if you want the answers from your
y last article discussed how to use J2SE 5.0’s new collection features, allowing you to designate a specific type to be used with a collection. Additionally, the new “for each”
rtificial intelligence (AI) has been in existence almost as long as computers. However, only recently have AI techniques been widely incorporated by companies to enhance traditional business applications. Building Intelligent
ritten by the inventors of the technology, Visual Studio Tools for Office is both the first and the definitive book on VSTO 2005 programming. VSTO is a set of tools
? Apache Derby 10.1 MySQL 5.0 PostgreSQL 8.1 One$DB 4.0 General ? ? ? ? Database Connections Multiple Multiple Multiple Multiple Concurrent Access to Multiple Databases ? ? ? ?
o develop even a simple J2EE application, developers must write lots of boilerplate code (as Enterprise JavaBeans, or EJB, in Java) and set up a myriad configuration files (as deployment
f you run a Web shop that uses direct credit card processing and you want to integrate PayPal, you’ll find that using PayPal as a processing service is not as
n our shared quest for more highly productive methods of developing software, those of us in the Java community have looked to J2EE to provide solutions for the more challenging
The following code shows you how to send and receive CGI messages from a Java application: import java.net.*;import java.io.*;class POSTrequest{URL url=null;URLConnection URLcon=null;OutputStreamWriter OSW=null;BufferedReader BR=null;PrintStream PS=null;public void GetReady() { try {
enerally, STL containers handle their storage automatically and efficiently. Yet, there are cases when you need to regulate a container’s storage manually?for example when you want to trim or empty
In general, when a smart pointer is designed, the usual methods proivided are: T* operator->() const and T operator*() const. So, in functions such as foo(const SmartPointer& ptr) { },
Sometimes, for documentation purposes, you need to locate all the stored procedures and objects/SQL tables upon which they depend. The following code shows you how: select distinct A.name as sproc_name,
Normally, people do casting in the code like this: Button btnSave = (Button) sender ;where sender is of Object Type. This same casting can be done using the as operator:
ince its inception, “write once, run anywhere!” has been the mantra and rallying cry for many architects and software engineers trying to convince their enterprises to move to or stay
ascading Style Sheets (CSS) are a powerful way to separate content from design in your Web Forms applications. Effective use of CSS is an easy way to maintain and consolidate
oost takes you far beyond the C++ Standard Library, making C++ programming more elegant, robust, and productive. Now, for the first time, a leading Boost expert systematically introduces the broad
he WCF is an incremental, yet evolutionary technology that brings all the formerly distinct and separate Microsoft connectivity technologies together under a single umbrella within the System.ServiceModel namespace. Included in
e all know that the most efficient way to access data from a database is to use stored procedures. For most applications, these stored procedures follow the same basic design
his essential book for all software developers?regardless of platform, language, or type of application?outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors
nternationalization of applications is something developers have been encouraged to do for years, though all-too-frequently it doesn’t get done. But the risks of not doing so are growing ever higher.
A pointer to a function refers to the memory address of the function. Just like arrays, the name of a function is the starting address of the function’s code. Here’s
In Oracle, you can only control read/write capability for an entire tablespace, not for a single table within a tablespace. So, if you want all the tables in a tablespace
You can make new tags/components using JavaScript blocks. Simply include a script iterating through all the script blocks in your page: etc… As soon as the browser renders the scriptblock,
Resource files are used in .NET to store culture-specific data all in one place, separate from the code. For example, suppose you are developing a multi-language Web site and you
Sometimes you need to pass parameters from an applet to an HTML file. For instance, you may want to detect, using an applet, the IP address of the viewer when
y now, almost everyone in the Java community has heard about Jakarta Commons, the set of reusable classes that various Jakarta projects use. But did you know that these classes
ne obstacle that’s impeded the development of voice applications is the availability of a dedicated, standard or well-known development architecture. To create robust voice applications, voice developers have had to
f you care about your data, you must upgrade to SQL Server 2005 the day it is released. There simply is no other option. An outrageous assertion? Perhaps. I tend
e thought we were going to cover a lot of topics in this episode of .NET Rocks!, but we managed to go over an hour without straying from Virtual PC
omputer data security has finally arrived as a front page news topic. A number of companies from Bank of America to ChoicePoint have finally raised the attention of consumers, business,