
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
recall my first laptop computer. During my first year of college, I purchased an NEC laptop from my college advisor, Art Sanchez. This computer was sweet. Here’s the list of
Welcome to the CoDe Magazine Focus issue on Tablet PC and Mobile PC application development. On behalf of the Mobile PC Business Unit at Microsoft (see Figure 1), I’d like
ibernate is a practical, high-performance Java persistence framework. Using Hibernate is nearly transparent, but the one detail that even Hibernate can’t hide is the notion of object identity and equality.
s the holiday season wraps up, many of you might have received new cell phones, PDAs, or other electronic gadgets. Many are probably equipped with J2ME. The ever-increasing capabilities in
Suppose you have a button that uses a Default property (set to true) and are editing text in a multiline text box on the same form. When you press the
When you’re freeing memory, remember to set the memory contents to 0 so no other malicious program can read it after it’s been freed. //For example#define DATA_SIZEBOOL function(){ char pszData
Creating a large folder hierarchy in SharePoint Document Library using Microsoft’s standard GUI takes a lot of time—which is unnecessary. Here’s an easier way: Create the folder hierachy first on
There are actually two ways in which you can find out whether a given column name is an identity or not in SQL Server: Method One: Select ColumnProperty(Object_id(‘Table_Name’), ‘FieldName’, ‘IsIdentity’)
fficient software debugging is definitely an acquired talent. Most programmers have some ideas on how to do it when they first get started but typically can’t handle a large complex
oday, a webcam is a common peripheral, used most often for video conferencing, that most people can easily afford. But what can you do with your webcam besides video conferencing?
onsider the following scenario. You have a production system that needs a lot of data from other systems on hand during the day. The data sources that you get this
hen I was a boy, I used to walk miles to school in the sleet and snow?uphill in both directions. The days of yore weren’t much easier when we aging
he J2EE world is full of development frameworks, all designed to simplify tedious low-level programming tasks and allow the programmer to get on with more interesting business-related stuff. The most
ative Windows installers offer unparalleled integration with the operating system, as well as a familiar installation process for your users?they just double-click on the installer, click Next a few times,
any design patterns and programming idioms rely on the use of friend declarations. However, when friend declarations are used in templates, the obfuscated syntax can bewilder even expert programmers. This
few years ago Kurt Cagle wrote an article discussing how to convert fixed-width text records to XML, a more malleable format, making it possible to use XSL and XSLT to
ith so many XML technologies, deciding what to use and when to use it can sometimes be bewildering. Many chose to build on top of existing DOM or SAX implementations
izTalk Server is the cornerstone product in Microsoft’s business process and integration strategy. It is through BizTalk that Microsoft is providing the tools to enable developers to integrate applications, businesses,
nce in a while something comes along that is so simple, so straightforward, and so obvious that it’s amazing that nobody did it long ago. Take blogging, for example: People
eginning in BREW 2.1, QUALCOMM introduced the ICamera API to support still and motion image capture from the image sensor found on many of today’s mid- and high-end BREW-enabled wireless
ost companies you call have automated voice attendants that walk you through a series of menu choices until you are finally directed to a live person. As the automated portions
nderstanding how ASP.NET really works under the covers can help you make decisions that can make your ASP.NET applications better. Understanding the innards of a platform always provides me with
hile veteran C and C++ developers know how hard it is to debug software memory problems, younger Java developers don’t need to learn about them because Java handles memory automatically
You can make the Java Secure Socket Extension list the supported cipher suites using the following code: SocketFactory SSLF=SSLSocketFactory.getDefault(); SSLsoclu=SSLF.createSocket(“12.110.20.211”,443); String[] cipher_suites=((SSLSocket)SSLsoclu).getSupportedCipherSuites(); for(int i=0;i
While this VB-to-the-Max tip is great, here are a few additional tips to either help you resolve this “bug” or work around it. Firstly, Microsoft has reported this as a
This recent tip gives advice on how to include an exit within a loop to avoid repeated code. While avoiding repeated code is prudent, using an exit from a loop
his fourth installment in an ongoing series on XMI leads me to a discussion of components. Components are an essential building block of your data model and are thus a
The following function finds out how many times a string is found inside another string: create function fnOccurances (@string varchar(8000),@pattern varchar(4000)) returns smallint asbegin declare @i int declare @counter int
o far, this Windows Communication Foundation (WCF, formerly known as Indigo) series has provided a primer, and discussed security and transactions. The final pillar in the tripod that supports software-as-a-service
nless your Web site contains only a single Web page, you need a mechanism for visitors to navigate between pages. For most sites, navigation is right up there with content











