
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
During testing or monitoring, there is a constant need to monitor the number of sessions created, so as to better correlate the performance metrics collected. The Performance Monitor tool is

Getting a user that has deleted rows with SQL is a multi-part process. First you have to search the transaction log file for information on deleted rows. SELECT [Transaction ID],
Chrome provides a nice tool, to save the page you are on as a shortcut to desktop. Select the tab that you want to save on your desktop as a shortcut, and go to Tools Menu. Choose More Tools – Add to desktop option. A new shortcut will be created on the desktop with the link to the page you were browsing.
Word allows you to restrict certain sections in the document from formatting or editing. To enable this on a section of text, choose the “Restrict Editing” option that is under the Developer Menu – Protect Section. You will see the ???Restrict Editing??? toolbar appear to your right. You can choose and set Formatting and/or Editing restrictions. You need to add a password to apply a restriction and also to remove the restriction.
When we open multiple tabs, and there is music/sound from one of the tabs it is tough to figure out which tab is emitting the sound in Chrome. An easy way is to look for the tab name/title in the open Chrome tabs. Chrome displays a volume icon just before the tab name/title if the tab is playing music/sound. You can thus quickly locate the tab and take further action.
Did you ever find a need to change the orientation of a word document? If yes, you can quickly do that by navigating to the ???Page Layout??? menu and choose the Landscape/Potrait orientation option.

Java collections – performance (Time Complexity) A set is a collection that contains no duplicate elements. Add Next Contains Data StructureHashSet O(1) O(h/n) O(1) Hash TableEnumSet O(1) O(1) O(1) Bit
Files have multiple properties and they are interesting to use. In fact, your own file system can be developed using them. Create a file named PATH.txt and try this program
System.Math provides the BigMul method for cases where you have to find the product of two large integer numerals that may result in a value that would cause an System.Overflow
Newtomsonft.json has helper methods that help to serialize objects to JSON. See below for a code snippet that uses the library and helps convert an object to JSON format. public
The ErrorProvider control is quite useful when it comes to user input validation. The next code segment assumes an ErrorProvider control named errorProvider1 has been placed on a form along
Java collections – performance (Time Complexity) A list is an ordered collection of elements. Add Remove Get Contains Data StructureArrayList O(1) O(n) O(1) O(n) ArrayCopyonWriteArrayList O(n) O(n) O(1) O(n) ArrayLinkedList

BlockingQueue in Java is more advanced Queue. It performs all functionalities of a Queue in addition to certain qualities. It waits for the Queue to be non empty before retrieving an element using take() method and holds on for a placeholder to be available before it can add an element to the Queue using the put() method. BlockingQueue is an Interface and can be used as below. We are trying to initialize an ArrayBlockingQueue with size of 5. BlockingQueue intQueue = new ArrayBlockingQueue(5); intQueue.put() will add the data and wait for a space if it is full. intQueue.take() will remove the element at the head of the Queue.
In order to flood fill drawn objects, you can make use of the next sample: using System; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Drawing; using System.Linq; using System.Text; using System.Windows.Forms; namespace FloodFill { public partial class Form1 : Form { public Form1() { InitializeComponent(); } Bitmap bm; Graphics g; private bool SameColor(Color c1, Color c2) { return ((c1.A == c2.A) && (c1.B == c2.B) && (c1.G == c2.G) && (c1.R == c2.R)); } private void tobien1(Bitmap bm, Point p, Color Color, Color LineColor) { Stack S = new Stack(); S.Push(p); while (S.Count != 0) { p = S.Pop();
Many times, it is tough to traverse up the control tree to reach the parent control. The best example is of a control in a template column of a grid.
There are cases in our math calculations where we would need absolute values of negative numbers. System.Math class’s Abs method helps in such cases. It returns the absolute value of
There are cases in our math calculations where we would need absolute values of negative numbers. System.Math class’s Abs method helps in such cases. It returns the absolute value of
SendKeys is very powerful. You can use SendKeys to send a different keycode from the one that was pressed. For example: private void TextBox1_KeyDown(object sender, KeyEventArgs e) { if (e.KeyCode

Some of the most useful tools that work in association with the w3af web application security scanner, are listed below: Wapiti (http://wapiti.sourceforge.net/): a Python-based script that discovers attackable URLs and
Windows calculator can be used for many functions such as date calculation and unit conversion beyond its normal computation. Open the calculator then go to the view menu and choose
In the old versions of .NET, we needed to override the default context menu and override the ProcessCmdKeyfunction to return True to disable Copy-Paste of content into textboxes through keys
String.join is an easy-to-use utility method in String class. public class StringJoin{ public static void main(String args[]){ //The first argument (refered as joinString) is used to join the subsequent argument(s)
It is quite easy to get the “Everyone” account name, with the help of the DirectorySecurity and SecurityIdentifier classes. Here is a small example of getting the name and allowing
To call Java methods using Lambda expressions you can use: – Car::makeCar //Static method of a class- Car::drive // Method of an instance- Car::new //Constructor of a class- Car::drive //
Yes, you can set multiple projects to be startup projects in Visual Studio. Right click on a solution file in Visual Studio. Choose “Set startup projects.” In the dialog that

A lot of time is spent on navigating in the HTML View of ASP.NET Pages that have too much HTML to find some little details. Visual Studio 2005 IDE provides

A lot of time is spent on navigating in the HTML View of ASP.NET Pages that have too much HTML to find some little details. Visual Studio 2005 IDE provides
The Appendtext method will automatically position the cursor to the end of the text, so that it will always show the last added text. If you need to avoid that,
You can restrict the connection to a database by specifying Single User mode, as shown below: USE master;GOALTER DATABASE YourDatabaseNameSET SINGLE_USERWITH ROLLBACK IMMEDIATE;GOALTER DATABASE YourDatabaseNameSET READ_ONLY;GOALTER DATABASE YourDatabaseNameSET MULTI_USER;GO This
Ideally, this is a performance enhancement and needs lot of visibility before hand to implement at early stages. There are numerous cases when you are running on low memory and want to limit the data in your transactions.Especially, when you are sure that you dont need all the records matching your query, you can have criterias set. Stil, there could be plenty of them returned and you may want just a handfull of them or a little more. In MySQL, LIMIT is a feature that helps fetch a certain number of records matching the criteria provided Eg: SELECT * FROM `database_name`.`table_name` LIMIT 10; The value of LIMIT is defined by what your need is. Use it accordingly to allow only the specified records is returned so that you also benefit with performance and quicker processing.











