
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
The article Why Migrate to the Semantic Webdescribed the benefits of the semantic web for applications that deal with real world objects. It outlined how an existing web application (CDMS)
Modern software development is, famously, a collaborative process. Unfortunately the tools we use to develop software don’t always reflect that home truth. Consider an application written in Java that uses
ntil not long ago, a standardized multithreading API for C++ was a pipe dream. Almost every operating system, compiler, and framework rolled their own threading libraries. These proprietary libraries were
atrices are very useful mathematical objects that science and technology professionals use to describe real-life scenarios and build abstract models for those scenarios. You will find matrices used in economics
Game developers take note: the future of video games is all about casual, social games that women and grandparents like to play; think Facebook and the Wii. Hardcore games like
hen you build complex UI applications, it is all too easy to end up with a messy, tightly coupled, interwoven mess that is difficult to develop and maintain; and impossible
he OpenBSD operating system claims to ship “secure by default” and aims to be “the world’s most secured operating system.” OpenBSD also boasts the capability to run on many hardware
hile many technologies promise to put features of desktop applications on the web, Adobe AIR brings web development to the desktop. Adobe AIR is a cross-platform runtime environment that allows
y now, you should already know that Apple has lifted the non-disclosure agreement (NDA) that bound developers to confidentiality regarding their work with the iPhone SDK. Developers are now free
As enterprise architecture (EA) matures into an established discipline in most moderate to large scale IT organizations, EA is increasingly being challenged to demonstrate objective evidence of its contribution to
Use the following C# 2.0 code to determine whether a string representation of date/time is valid: string s=”04/01/2008″; //string to be converted to date time object.DateTime result;bool success = DateTime.TryParse(s,
This tip shows you how to call a SOCKS proxy server from Java code using the Socket class: SocketAddress addr=new InetSocketAddress(?socks_server_proxy?, socks_port);Proxy proxy=new Proxy(Proxy.Type.SOCKS,addr);Socket socket=new Socket(proxy);InetSocketAddress final_addr=new InetSocketAddress(?final_server?, final_port);socket.connect(final_addr);?
In SQL Server Management Studio, you can use the Alt key in your keyboard to select blocks of text to execute. For instance, suppose you have the following statements: –@DELETE
n this article you will see how to use the Synchronized Multimedia Integration language (SMIL) and PHP to add great slideshow presentations to your web sites. If you’re not already
splash screen is created upon application startup and is ended after the the main Window class’s initialization code executes. Professional-looking applications geenrally use splash screens to let their users know
he ACME Toothpick Company has a problem: their applications do not communicate. The toothpick making process is causing big headaches for the purchasing and sales departments. The problem stems from
By default, ASP.NET doesn’t allow you to upload files bigger than 4MB to the server. You can fix this by overriding the default value of 4MB in the web.config file.
Here’s how to check, uncheck, enable, and disable a checkbox in MFC: CButton* pBtn = (CButton*) GetDlgItem(IDC_SETUP_AM); pBtn->SetCheck(0);// uncheck it CButton* pBtn = (CButton*) GetDlgItem(IDC_SETUP_AM); pBtn->SetCheck(1);// check it CButton* pBtn
To provide a user’s password to a proxy server, use the following code: URLConnection URLcon=null;URLcon = url.openConnection();byte[] x=”name:password”.getBytes();//coding in Base64String s = new sun.misc.BASE64Encoder().encode(x); URLcon.setRequestProperty( “Proxy-Authorization”,s);
harePoint Solution Package files are Microsoft’s “preferred choice” for deploying Windows SharePoint Server (WSS) components. A Solution Package is a single compressed Windows Solution Package (.wsp) file containing all the
s multi-core and multi-CPU systems become more prevalent, the opportunity to perform several tasks at once is now a reality. Unfortunately, the way most systems are designed it is not
o far, you’ve been learning about the interesting things you can do with Android. However, if you want your application to see the light of day and run on other
n the past couple of years, data binding has emerged as an important concept for GUI development in Java. Its main objective is to simplify the task of syncing a
Programmer and self-described internet entrepreneur Evan Prodromou has been involved in starting open source and open content projects. His best-known is Wikitravel, a Wiki site for collaboratively edited travel guides.
Regional settings, especially dates, are always a problem in code. For example, suppose the product is developed in U.S. and deployed in UK. Users entering dates in UK format would
Most applications nowadays authenticate through LDAP (directory service). To set this up, first register the SSL certificate using the keytool utility, as shown below: Register ssl certificate using keytool:keytool -import
ack before version 1.0 of the CLR shipped, Microsoft engaged a variety of commercial and academic organizations to produce languages that ran on .NET; an effort code-named “Project 7.” One
cron (an abbreviation for chronograph) defines a process used to execute a script, start a program, send a newsletter, backup a database, display a message, remove some unnecessary files at
lass objects use a constructor argument list as their initializer, aggregates use braces, strings use literal text with double quotes, and containers use yet another form of initialization. These diverse





