devxlogo

The Latest

Send fax from SQL Server using Microsoft Word

This article explains how you can create a Microsoft Word document from T-SQL and fax it through a method exposed by its Automation object model. You can create and destroy

Vemod MDI Background Control

This control does one thing, but does it well. It centers a picture on an MDI forms Client area. Windows Meta Files (WMF) can be transparent. Just place the control

Enumerate the users’ rights on a DB’s objects

SQL Server provides several security levels, and the control that the system administrators can pursue over the DB’s objects is extremely accurate. It’s often useful to know which rights each

Manage the SQL Server date format with SQL DMO

If you haven’t localized SQL Server for your language, the default date format is the American one: DD/MM/YY. You may need to display a date in different formats, and you

Advanced Lock Monitoring

In order to assist continuous and effective monitoring of lock status, SQL Server offers the system stored procedure SP_LOCK, which can provide several useful pieces of information on how locks

Restore the SQL Server master database

Restoring a corrupted master database is one of the most difficult tasks you may have to deal with. If this catastrophic event happens, here’s how to proceed. First, you need

Restoring Your Database Safely

s I’ve shown in my previous 10-Minute Solution, “Choosing the Right Backup in SQL Server,” SQL Server provides you with numerous ways to back up your database, allowing you to

Finding and Eliminating Duplicate Data

uring my years as a database developer I have often faced the task of finding and deleting duplicate data in a database. Duplicates impact data accuracy and credibility, and they

Calling a Function Through a Pointer

The common way of calling a function through a pointer is using the pointer as if it were a function. In other words, if p is a pointer to a

Calling A Template Member Function

You can define a member function that is a template in a non-template class. For example: class A{public: template void func(); // member template }; How can you call such

Introducing Generators

A generator is a function or algorithm returning a series of values upon successive calls. The most common example is a random number generator although generators have many other useful

Converting char to wchar_t

The standard iostream family of classes defines the widen() member function which converts a single char to its wide-character equivalent. widen() has the following prototype: char_type widen(char c) const; The

Converting a hex String to int

In a previous tip, I showed how to convert a string containing a hexadecimal to int using the sscanf() function. stringstream objects can perform this feat too, in a more

Converting wchar_t to char

In addition to the widen() member function, the iostream framework supports the narrow() member function which performs the reverse operation, i.e., converting a wide character to its corresponding char value.

Verifying a Destructor’s Invocation

Conceptually, destructors of global objects are called after main() has exited. For this reason, many debugging and memory checking tools are confused and report phantom memory leaks or warn about

std::string and null Characters

Unlike C-strings, a std::string object may contain null characters in the middle of its internal buffer. For example: std::string s= Related Posts Even More Robust Features in Updated Devart ODBC

What’s in a String?

By an unfortunate twist of fate, the term Related Posts Docker Update Adds Orchestration CapabilitiesAdding a Mask in CSSOracle, Salesforce, Microsoft lead AI agentic workforce5G Testbeds Are Revolutionizing Naval OperationsAcer

Self-referential Inheritance

Consider the following example: class A : public list < A >{ // …}; Does your compiler accept it? According to the Standard, using an incomplete type as a template

Viewing Error Outputs From Java Applets in IE

The file Java/Javalog.txt in the Windows directory (i.e. C:windowsJava.Javalog.txt for windows and C:winntJavaJavalog.txt for NT) contains information for the last applet that was loaded by Internet Explorer. This file contains

How to Access Cookies Set at the Client Side

Class javax.servlet.http.cookies can be used to access cookies on the client side. The following code demonstrates this technique. The code also checks for the cookie names in order to access