
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
ith so many XML technologies, deciding what to use and when to use it can sometimes be bewildering. Many chose to build on top of existing DOM or SAX implementations
izTalk Server is the cornerstone product in Microsoft’s business process and integration strategy. It is through BizTalk that Microsoft is providing the tools to enable developers to integrate applications, businesses,
nce in a while something comes along that is so simple, so straightforward, and so obvious that it’s amazing that nobody did it long ago. Take blogging, for example: People
eginning in BREW 2.1, QUALCOMM introduced the ICamera API to support still and motion image capture from the image sensor found on many of today’s mid- and high-end BREW-enabled wireless
ost companies you call have automated voice attendants that walk you through a series of menu choices until you are finally directed to a live person. As the automated portions
nderstanding how ASP.NET really works under the covers can help you make decisions that can make your ASP.NET applications better. Understanding the innards of a platform always provides me with
hile veteran C and C++ developers know how hard it is to debug software memory problems, younger Java developers don’t need to learn about them because Java handles memory automatically
You can make the Java Secure Socket Extension list the supported cipher suites using the following code: SocketFactory SSLF=SSLSocketFactory.getDefault(); SSLsoclu=SSLF.createSocket(“12.110.20.211”,443); String[] cipher_suites=((SSLSocket)SSLsoclu).getSupportedCipherSuites(); for(int i=0;i
While this VB-to-the-Max tip is great, here are a few additional tips to either help you resolve this “bug” or work around it. Firstly, Microsoft has reported this as a
This recent tip gives advice on how to include an exit within a loop to avoid repeated code. While avoiding repeated code is prudent, using an exit from a loop
his fourth installment in an ongoing series on XMI leads me to a discussion of components. Components are an essential building block of your data model and are thus a
The following function finds out how many times a string is found inside another string: create function fnOccurances (@string varchar(8000),@pattern varchar(4000)) returns smallint asbegin declare @i int declare @counter int
o far, this Windows Communication Foundation (WCF, formerly known as Indigo) series has provided a primer, and discussed security and transactions. The final pillar in the tripod that supports software-as-a-service
nless your Web site contains only a single Web page, you need a mechanism for visitors to navigate between pages. For most sites, navigation is right up there with content
ast issue I gave you a ‘hit-the-ground-running’ introduction to custom Web control development and showed you how to build a rendered control and an inherited control. In this issue you’ll
learned very early in my career that the sexiness of an application can have as much effect on its salability as its functionality. I’ve seen a non-technical boss take one
inalization is a feature of the Java programming language that allows you to perform postmortem cleanup on objects that the garbage collector has found to be unreachable. It is typically
icrosoft Visual Studio Team System (VSTS) provides tools for every role in a typical software development team: Architects, Project Managers, Developers, and Testers. It enables project managers to use the
ne of the most challenging tasks faced by Windows application developers is the deployment of their applications on the client machines. Once an application is deployed, any changes or maintenance
magine that you’ve just finished building a database for another Web-based system. Now it’s time to start thinking about writing all that SQL to move the data in and out
his installment of “The Baker’s Dozen” covers some of the major features in Visual Studio 2005. Visual Studio 2005 offers language, data handling, and development environment enhancements that are sure
This VB function returns the DNS domain name (westcoast.mycorp.com) from the passed LDAP distinguishedName (CN=Administrator,DN=Users,DC=westcoast,DC=mycorp,DC=com). Function DN2DomainName(ByVal strDN As String) On Error Resume Next Dim strDomainName As String Dim strDNParts()
Because everything in Linux is composed of files, you can get any required information from the /proc/meminfo file. Here’s the code: int getFreePhysicalMemory(){ ifstream meminfo(“/proc/meminfo”); if ( ! meminfo.is_open() )
Overloading a constructor or a method so it takes an extra argument based upon some specific requirement can result in duplicate code. For instance, a project that contains a lot
You may have found that sometimes, copying a custom .NET object to the clipboard doesn’t work. That’s because retrieving a custom object from the clipboard returns nothing if the object
lthough the EJB 3.0 specification has yet to be released, it is already generating much interest in the software development community by both proponents and opponents alike. All recognize the
ow many times have you scaled a movie clip that started out looking like Figure 1 …and ended up looking like Figure 2? It’s quite common to see your carefully
enerics, a new feature introduced with .NET 2.0, provides type safety at compile time. Generics let you create data structures without committing to a specific data types in your code
ometimes we developers put unnecessary burden on the server, having it perform too many sorts or sort more data than necessary. By applying the techniques described in the following sections
bout two years ago, I wrote an editorial explaining (and excoriating) the Eolas lawsuit?or more pointedly, the patent itself. Given Microsoft’s recent announcement that it’s planning to change Internet Explorer











