devxlogo

We are an award-winning tech entrepreneurship website where trusted experts can provide value globally.

Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.

devxlogo

Trusted for 26 years

Over 30K Articles

1M+ Readers

Expert-reviewed

10K+ Tech Terms

As seen in:

microsoft logo
business_insider_logo
wired_logo
berkley
arstechnica_logo
hackernoon

The Latest

Using DOM 3.0 Validation Techniques with XDK 10g

he DOM 3.0 Validation specification provides for validation of an XML document with a DTD or an XML Schema. The advantage of DOM 3.0 Validation over validation with a validating

The Purpose of the GO Statement

Although GO is not a T-SQL statement, it is often used in T-SQL code and unless you know what it is it can be a mystery. So what is its

Adding an Existing Windows Form to Another Project

Adding an existing Windows Form in VS.Net 2003 means adding two files?for example, a MyForm.cs file with C# code and an XML-based MyForm.resx assembly resource file. In VS.Net 2005, there

Ruby—A Diamond of a Programming Language, Part 2

uby is an object-oriented, metaprogramming language that has garnered a lot of attention in software development circles as of late. Metaprogramming is a means of writing software programs that write

Into the Future

ablet PC and Mobile PC development is very popular today, and will only get more popular and important in the future. For Mobile PC developers, there are significant changes coming

Implementing a Proxy Selector in the Tiger Release of Tiger

Use this code to implement a proxy selector class in the Tiger release of Tiger: import java.net.*;import java.util.*;import java.io.*;public class MyProxySelector extends ProxySelector{ //implement the select method public List select(URI

Dealing with Wildcard Characters in Oracle

Developers generally tend to use characters such as % as a delimiter for storing data in an Oracle database. But because Oracle views the % character as a Wildcard character,

Move a Title-less Form

If you’ve struggled with setting static variables in MouseDown, and MouseUp commands to enable users to drag borderless windows around the screen, here’s a simpler way: If Button = False

Get Started with RFID Development in Java

ybase iAnywhere’s RFID Anywhere is a middleware software platform built on the .NET platform that simplifies every phase of radio frequency identification (RFID) projects, including development, deployment, and ultimately the

An Introduction to RFID Development

adio frequency identification (RFID) is an enabling technology. By itself, RFID doesn’t provide much value, but it does enable companies to develop applications that create value. RFID describes systems that

Running J2ME Applications on Palm-powered Devices

he Palm Treo platform has gained wide appeal as a communications device for mobile professionals, enjoying several launches in the enterprise over the last few months. With the wide use

Know Your Networks

he importance of enabling your software to identify the current network connections and change behavior has never been greater, as more people use laptops, notebooks, and Tablet PCs. With the

Retrieve All Columns from Each Table in Every Database

This stored procedure retrieves all the columns of each table in every database. create procedure SP_GetAllColumnsFromAllDB/*———————————————————————- Procedure to retrieve columns of all the databases– Usage : exec SP_GetAllColumnsFromAllDB– Logic is:

Build a Reusable AJAX Class

Building a reusable AJAX class can help you eliminate some of the headaches when you’re starting out: Open a new file called connection.js and type the following lines in to

Convert Numbers to Excel Column Names

This algorithm converts column numbers (1-x) to Excel column names. It works for any number and does not have a limit. ‘————————————————–‘ Columns can be any number from 1 to

Give Your .NET Apps the Face They Deserve with WPF

icrosoft first publicly demonstrated Avalon way back in 2003 at the Professional Developers’ Conference (PDC) in Los Angeles. They touted Avalon as the next generation in user interface methodology, and

Programming Serial Ports Using Visual Basic 2005

isual Basic programmers who do networking programming will no doubt be familiar with the MSCOMM control in VB6. For those of us who followed VB’s progression to VB.NET, it was

Retrieve Records from a Supplied SQL Statement

To retrieve the required field from the table based on the supplied condition, use the following code: Function GetQueryResults(strSql As String, Optional ReadOnly As Boolean = True) _As Recordset Dim

Run Tomcat with a Security Manager

To run Tomcat with a security manager, you must add your own policy lines to the catalina.policy file?like when you build a SecurityManager. The catalina.policy file can be found here:

Finding a SQL Server Object

To find a SQL Server object, such as a user table, query the sysobjects system table in the local database. If the database name is unknown, use the following query:

Speed Up Your SQL Inserts

atabase performance is one of the most critical characteristics of almost any application, and for the developer or DBA it usually depends on how fast they can retrieve data. Hence,