devxlogo

The Latest

What Does “strictfp” Do?”

When this modifier is specified, the JVM sticks to the Java specifications and returns the consistent value independent of the platform. That is, if you want the answers from your

Creating Custom Generic Collections with J2SE 5.0

y last article discussed how to use J2SE 5.0’s new collection features, allowing you to designate a specific type to be used with a collection. Additionally, the new “for each”

Book Excerpt: Visual Studio Tools for Office

ritten by the inventors of the technology, Visual Studio Tools for Office is both the first and the definitive book on VSTO 2005 programming. VSTO is a set of tools

Open Source Database Feature Comparison Matrix

? Apache Derby 10.1 MySQL 5.0 PostgreSQL 8.1 One$DB 4.0 General ? ? ? ? Database Connections Multiple Multiple Multiple Multiple Concurrent Access to Multiple Databases ? ? ? ?

Java EE 5.0: Towards Ease of Development

o develop even a simple J2EE application, developers must write lots of boilerplate code (as Enterprise JavaBeans, or EJB, in Java) and set up a myriad configuration files (as deployment

Send and Recieve Messages Using a CGI Java Application

The following code shows you how to send and receive CGI messages from a Java application: import java.net.*;import java.io.*;class POSTrequest{URL url=null;URLConnection URLcon=null;OutputStreamWriter OSW=null;BufferedReader BR=null;PrintStream PS=null;public void GetReady() { try {

Introduction to Cascading Style Sheets

ascading Style Sheets (CSS) are a powerful way to separate content from design in your Web Forms applications. Effective use of CSS is an easy way to maintain and consolidate

The Windows Communication Foundation: A Primer

he WCF is an incremental, yet evolutionary technology that brings all the formerly distinct and separate Microsoft connectivity technologies together under a single umbrella within the System.ServiceModel namespace. Included in

Building a Stored Procedure Generator

e all know that the most efficient way to access data from a database is to use stored procedures. For most applications, these stored procedures follow the same basic design

Book Excerpt: The 19 Deadly Sins of Software Security

his essential book for all software developers?regardless of platform, language, or type of application?outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors

Arrays of Functions

A pointer to a function refers to the memory address of the function. Just like arrays, the name of a function is the starting address of the function’s code. Here’s

Making Tables Read-only in Oracle

In Oracle, you can only control read/write capability for an entire tablespace, not for a single table within a tablespace. So, if you want all the tables in a tablespace

Modifying Client JavaScript Code at Runtime

You can make new tags/components using JavaScript blocks. Simply include a script iterating through all the script blocks in your page: etc… As soon as the browser renders the scriptblock,

Creating and Using Resource Files

Resource files are used in .NET to store culture-specific data all in one place, separate from the code. For example, suppose you are developing a multi-language Web site and you

Security Is Job One!

omputer data security has finally arrived as a front page news topic. A number of companies from Bank of America to ChoicePoint have finally raised the attention of consumers, business,