
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
hether it’s full-text search or geometric queries, you’ll have to move beyond BLOBs to get the most from storing Ink in the database. The SQL standard does not provide an
lthough the EJB 3.0 specification has yet to be released, it is already generating much interest in the software development community by both proponents and opponents alike. All recognize the
llocating objects on a predetermined memory address has become a popular idiom in recent years, particularly in mobile programming, embedded systems, and custom garbage collectors. However, the technique shown in
he little voice in my head shouted “Don’t do it! Don’t do it!” as I contemplated using the worn out clich? “Good things come to those who wait” to describe
n a recent instance of this column, I referred to my “evil twin,” as in: “And I didn’t write this article. My evil twin did it. Don’t come looking for
n a recent issue (“Am I a Mad Scientist?” CoDe Magazine, May/June 2005), I wrote about the obvious practical benefits of creating strongly-typed classes within a custom software application. Since
his summer and fall have been an absolute blast. I attended a number of user groups and conferences. The fun started in April with my first Code Camp. I flew
am the host of “.NET Rocks!”, an Internet audio talk show for .NET developers online at www.dotnetrocks.com and msdn.microsoft.com/dotnetrocks. My co-host Richard Campbell and I interview the movers and shakers
It’s not a good idea to change the default parameters of virtual methods because the default parameters are bound at compile time (static binding), whereas virtual methods themselves get bound
Often, data in Oracle applications is stored in extended columns known as Descriptive Flex Field (DFF) columns. These are character columns which you can map to store any kind of
n our increasingly interconnected world, it’s more and more important for code to be able to handle time zones gracefully. For example, if call centers in Bangalore and London use
Along with caching the objects, you can also enhance a script’s performance by caching the entire script?in other words, by including it in a .js file. This way, the browser
How many times have you tried to get rid of the intrusive log messages from the API you’re using? The solution is easy: in your log4j configuration file, just include
f you are among those enterprise developers routinely facing the tasks of processing large XML files whose sizes range from tens to hundreds of megabytes, most likely you have used
t’s common in imaging applications for images to be displayed at different sizes. If such images are annotated with Ink, it’s necessary for the Ink to be scaled to the
f you are a part of a small business, either you or someone at your organization likely deals with QuickBooks. QuickBooks is the most broadly used accounting software in the
ll but the simplest applications store data in a central location and access it over a network. However, in many scenarios, distributed applications cannot assume a certain kind of network
s of version 2.0, JAX-RPC has been renamed JAX-WS. But the change is not in name alone. JAX-WS offers simplified development, better platform and language independence, and an end to
2EE developers working in a standard lifecycle model often face challenges in managing deployment descriptors for the different lifecycle stages. In larger J2EE development environments where IT governance is an
oma Somasegar, Microsoft’s Vice President for Development technologies kicked off the winter session of VSLive! in San Francisco Monday, with little news but a lot of enthusiasm for both recently
he pressure is on for IT to deliver applications that can change on a dime?evolving as quickly as the business evolves even in the face of uncertain requirements. To address
When you use System.out.println( ) by passing an object as an argument, the JRE invokes its toString( ) method by default. If you haven’t overridden this method, then you end
icrosoft SQL Server 2005 Reporting Services (SSRS) provides open protocols for integrating reporting clients regardless of the targeted programming language and platform. A noticeable missing piece in its integration strategy
Ever forgot to un-share a folder that you shared with a colleague or friend? Ever forgotten the path of a folder that you shared? Want to know who has opened
This example retrieves items in a list that have been checked and simply outputs them to the Output window. Assume the list has been bound to a DataSource, like a
One of the most common errors while porting from 32-bit Code to a 64-bit code is in the use of Math.h library functions. Suppose you use a call to the
irtual machines can cut time and money out of the software development and testing process, but they aren’t the best choice in every scenario. When should you use virtual machines
uppose you have to deploy a highly available and scalable database backend solution for an Internet application (similar to what is described here). A cluster immediately comes to mind. A
ecurity threats are an ever-present concern when using the Internet. Something as simple as browsing the Internet can introduce malware into a machine. Firewalls, antivirus, and antispyware software and good
id you ever notice how IT trends tend to be cyclical, mirroring trends in clothing styles and television shows? Women are wearing bell-bottoms again and we’re watching a lot of











