We are an award-winning tech entrepreneurship website where trusted experts can provide value globally.

Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.

devxlogo

Trusted for 26 years

Over 30K Articles

1M+ Readers

Expert-reviewed

10K+ Tech Terms

As seen in:

microsoft logo
business_insider_logo
wired_logo
berkley
arstechnica_logo
hackernoon

The Latest

DevX - Software Development Resource

ClickOnce for the Real World, Not Hello World

fter four years of trying out every iteration of Web server application deployment that Microsoft created for .NET, ClickOnce has finally allowed me to succeed in deploying one particularly complex

DevX - Software Development Resource

Designing High Performance Stored Procedures

anaging large amounts of data is always a challenge. Several major database vendors claim that their database engines are ready for terabytes of data, which is true to a certain

DevX - Software Development Resource

Find Common Denominators in C++

The functions in this tip find the greatest common divisor (GCD) or the least common multiple (LCM) of two given integers. Getting the GCD through recursion: int GCD(int x,int y)

DevX - Software Development Resource

Use Javascript Templates in Static HTML Pages

If your site contains pure static HTML pages, you’ll have a tedious time entering the same header and footer HTML tags on all the pages. This is where JavaScript comes

DevX - Software Development Resource

How to Use Oracle Java XQuery API

This code outlines the main steps involved in using the Oracle Java XQuery API (OJXQI). If you are familiar with the DataDirectXQuery – XQuery for Java (DDXQ-XQJ), you may notice

DevX - Software Development Resource

Use String.Compare to Compare Case-insensitive Strings

To perform a case-insensitive string comparison, use the String.Compare function. One of this function’s overloaded methods has a third paramenter (boolean) which specifies whether a case should be ignored or

DevX - Software Development Resource

Exploring Geronimo’s GBean Framework

eronimo is built around an Inversion of Control (IoC) kernel that consumes and manages components called GBeans. The GBean framework is the vehicle by which new behaviors are added to

DevX - Software Development Resource

Inherent AJAX Security with Java and JSF

ith the popular adoption of AJAX techniques mushrooming on the web today, real-life security issues were sure to follow, as illustrated by the Yamanner and MySpace worms. The debate over

DevX - Software Development Resource

Using the URLEncoder/URLDecoder Classes

To include special characters such as spaces and quotes in a URL string, you need to encode them. Similarly, you need to decode encoded characters in a URL to recover

DevX - Software Development Resource

Using Firefox’s JavaScript Console

When a JavaScript error occurs in IE, it shows a popup message asking whether you want to continue the script (if you’ve disabled this popup window, the error notification shows

DevX - Software Development Resource

Exploring Secrets of Windows Form Validation

nput validation is something that every program needs, and every programmer dreads. Most developers craft hard-coded program logic to verify that a phone number consists of 7 or 10 digits;

DevX - Software Development Resource

Safeguard Your enums: Make Them Strongly-Typed

num types have been a valuable asset in the arsenal of C++ programmers for many years. However, their current specification has some security loopholes that can lead to bugs and

DevX - Software Development Resource

The POJO Container: POJO Clustering at the JVM Level

he current enterprise Java stack contains facilities for clustering the application server and application frameworks. To the consternation of enterprise Java developers, and consequently, to operators, application state objects lack

DevX - Software Development Resource

ADO.NET vNext Part 3: Querying with LINQ

he previous article in this series introduced the core concepts of Object Services Layer, including the steps to perform CRUD (Create, Read, Update and Delete) operations against the Entity Data

DevX - Software Development Resource

Graphical Tools for MSDE

Microsoft’s small-footprint SQL Server-compatible MSDE database (now replaced by as SQL Server Express) does not include graphical tools. That makes manipulating database objects difficult, or at least irritating. However, there

DevX - Software Development Resource

Create Two-Dimensional Arrays in the Heap

This code demonstrates how to create two-dimensional arrays in the heap: // Returns a pointer-to-pointer to a newly created array// of size [row : col].int **Create2D(int row, int col){ int

DevX - Software Development Resource

Read Entries from JAR/ZIP Archives with the URL Class

This tip shows you how to display the entries from a JAR/ZIP archive using the java.net.URL class. The key of the example is the URL construction. import java.net.*;import java.io.*;import java.awt.*;import

DevX - Software Development Resource

Go Inside the Java Real-Time System

he Sun Java Real-Time System (Java RTS) is the first conformant commercial implementation of Java Specification Request (JSR) -001, the Real-Time Specification for Java (RTSJ). Although initially released in 2002,

DevX - Software Development Resource

ClickOnce: Delivering .NET Applications Via the Net

rom the simplest point of view, ClickOnce is a software technology from Microsoft that gives .NET developers the ability to publish complete applications (executable programs along with their resource and

DevX - Software Development Resource

Force Attribute Value Inheritance in XSL-FO

To force an XSL-FO attribute to inherit the value of another attribute, use the inherited-property-value: &ltfo:block color=”blue”> Hello to you!!! The idea is that the “Hello” foreground will be blue

DevX - Software Development Resource

Obtain a Secure PDF from an FOP Processor

This tip shows you how to obtain a secure PDF from an FOP processor. This means the user can’t open the PDF without a user password and, once downloaded, cannot