
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
ith the popular adoption of AJAX techniques mushrooming on the web today, real-life security issues were sure to follow, as illustrated by the Yamanner and MySpace worms. The debate over
any factors influence application performance, but in essence, the most important is to be aware of how to optimize your applications so they consume the least amount of memory and
he Eclipse Standard Widget Toolkit (SWT) is growing in popularity, as evidenced by its use in applications like Azureus and RSSOwl. In this 10-minute solution, you will learn how to
To include special characters such as spaces and quotes in a URL string, you need to encode them. Similarly, you need to decode encoded characters in a URL to recover
ADO.NET generates indexes on the primary key(s). So, if you have to search a datatable for records based on some primary key value, use DataTable.Rows.Find() instead of DataTable.Select(). The Find
When a JavaScript error occurs in IE, it shows a popup message asking whether you want to continue the script (if you’ve disabled this popup window, the error notification shows
hy are so many articles and books written about development methodologies? I believe it’s because improving the efficiency of a development team is a never-ending battle. Technology keeps changing and
nput validation is something that every program needs, and every programmer dreads. Most developers craft hard-coded program logic to verify that a phone number consists of 7 or 10 digits;
num types have been a valuable asset in the arsenal of C++ programmers for many years. However, their current specification has some security loopholes that can lead to bugs and
he current enterprise Java stack contains facilities for clustering the application server and application frameworks. To the consternation of enterprise Java developers, and consequently, to operators, application state objects lack
he previous article in this series introduced the core concepts of Object Services Layer, including the steps to perform CRUD (Create, Read, Update and Delete) operations against the Entity Data
Microsoft’s small-footprint SQL Server-compatible MSDE database (now replaced by as SQL Server Express) does not include graphical tools. That makes manipulating database objects difficult, or at least irritating. However, there
any power users build presentations using data from Excel or other data sources. This article shows how to automate Microsoft PowerPoint 2003 from within a Visual Studio 2005 application. The
This code demonstrates how to create two-dimensional arrays in the heap: // Returns a pointer-to-pointer to a newly created array// of size [row : col].int **Create2D(int row, int col){ int
This tip shows you how to display the entries from a JAR/ZIP archive using the java.net.URL class. The key of the example is the URL construction. import java.net.*;import java.io.*;import java.awt.*;import
he new version of the Java Database Connectivity API (JDBC 4) is getting a major face-lift with many great new features. Perhaps the most important update is the support for
n my last article, “Drill-down on Three Major New Modules in Python 2.5 Standard Library,” I discussed how the ctypes, pysqlite, and ElementTree language modules can save you time and
his is the last entry in a series of articles on Microsoft’s “patterns & practices” (p&p) Enterprise Library tools, and how you can use them in your ASP.NET applications. Enterprise
icrosoft’s new ClickOnce auto-updating technology can radically simplify application deployment. Using it, .NET developers and architects can deliver highly interactive desktop applications while gaining the centralized maintainability and “always-up-to-date” qualities
he Sun Java Real-Time System (Java RTS) is the first conformant commercial implementation of Java Specification Request (JSR) -001, the Real-Time Specification for Java (RTSJ). Although initially released in 2002,
rom the simplest point of view, ClickOnce is a software technology from Microsoft that gives .NET developers the ability to publish complete applications (executable programs along with their resource and
To force an XSL-FO attribute to inherit the value of another attribute, use the inherited-property-value: <fo:block color=”blue”> Hello to you!!! The idea is that the “Hello” foreground will be blue
This tip shows you how to obtain a secure PDF from an FOP processor. This means the user can’t open the PDF without a user password and, once downloaded, cannot
It’s convenient to be able to store your most commonly used code snippets in the clipboard ring of your .NET IDE, but you lose them when you close the IDE.
Using a loop and the mathematical formula for a spiral, you can use pset(x,y) to plot the points returned by the formulas. The variables a and b determine the shape
ualcomm Brew’s component-oriented architecture and rich collection of components?interfaces, in Brew parlance?makes it easy to find a component to accomplish a particular task, such as decompressing an incoming stream (try
rawing text in Visual Basic 6 was all very simple?both the process and the results. First, you would set a form or PictureBox’s CurrentX and CurrentY properties and then call
This tip shows you how to display the entries from a JAR/ZIP archive using the java.net.URL class. The key in this example is the URL construction. import java.net.*;import java.io.*;import java.awt.*;import
The ability of Windows XP to save passwords for Web sites and network resources can be very convenient. Of course, it’s true that anyone with access to your computer can
Suppose you want to have a primitive type with a null (or an unknown) value. This is where you would use a nullable type. Nullable types have the following characteristics:











