
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
Table(s) holding every day transaction data can grow huge in size over period of time. This not only slows down applications, it also causes database contention leading to maintainence nightmare.A
Have you ever needed to share many folders simultaneously? Windows provides an executable to do just that. It’s called the “Share Creation Wizard.” Call this wizard by typing SHRPUBW in
Forward declaration is a handy mechanism for reducing the number of files you include in your headers. It is especially useful if your header file needs to be used by
he word processor was invented to simplify the preparation of words to be printed on paper. It offered font management, layout management, and the ability to type words onto a
Suppose you need to insert 200,000 records into a database in Hibernate. You’ll need to adjust the following settings: //set the JDBC batch size (it is fine somewhere between 20-50)hibernate.jdbc.batch_size
have always considered logging a critical function of any production application; however, it’s often overlooked. Logging is often added to the application only after the functionality is already defined and
ike the freely downloadable Microsoft .NET Framework 2.0 SDK, the free open source Mono platform provides a number of command line utilities used to compile .NET source code and manipulate
y last article mentioned the BREW IThread as a possible solution to the challenges of dealing with blocking code on BREW. Whether you’re porting existing code to BREW or writing
rite once, run anywhere. This Java motto seems to hold true even for mobile devices. Indeed, since it was born J2ME has had an ever-increasing impact on mobile development. Some
This code is for MSSQL Server, but applicable for MS SSQL Server 7 or above. Check in T-SQL: SELECT OBJECTPROPERTY(object_id(‘TableToBeChecked’), ‘TableHasIdentity’) SQL Server returns 1 if the table has an
It’s common knowledge that you should avoid using the malloc function in C++. Most programmers use new in its place. The biggest advantage to using new is that it not
Because you need to use the new line character in most outputs?and because the line-terminating characters differ on different systems?you need to be able to identify what kind of system
One of the most fascinating aspects of programming is making things work. And that is not limited to just what you can do with your computer; a much more exciting
any Agile development methodologies require testing source code early and often. Because inefficient software testing methods result in code that is not tested often, it is critical to adopt a
ou can think of an XML document as a relational table where the various elements represent columns in a database table. Therefore, by mapping the various elements to a table,
n the 1927 film Metropolis, Planners decide to build a monument to mankind’s greatness, but they can’t construct it themselves. The film moves from a utopian environment where the planning
Oracle does not have a mechanism by which you directly change column names. But this workaround is quick and efficient. Consider TableA: COLUMN_1 NUMBERCOLUMN_2 VARCHAR2(500)COLUMN_3 DATE You want to change
To take advantage of the power of XMLSchema in a SAX or DOM application, you simply have to set two properties. In JAXP 1.3, use the javax.xml.validation package. The two
When you execute a new query and populate an existing dataset, the newly retrieved records are appended to the existing records in the dataset. If you wish to remove the
While multiple inheritance is an extremely useful feature?escpecially in large scale software, it can also lead to a problem known as the DDD, or “Dreadful Diamond on Derivation,” or simply
Here are three quick ways to determine a computer’s name: Type Hostname in the Command Prompt, then press the Enter key. Press the Windows and Pause keys to bring up
ow many times have you seen this scenario: SQL Server developers understand business rules, yet when they try to use triggers and constraints to implement them the database ends up
his installment of the Baker’s Dozen presents an introduction to remoting and remoting interfaces. Using .NET remoting you can call and execute code running outside your machine’s physical boundaries, such
oes anybody need an introduction on JUnit? No? OK, so I’ll assume that you know this Java unit testing framework created by Kent Beck and Erich Gamma and skip the
he previous article in this series discussed how to use the Visual Studio Tools for Office (VSTO) platform to build a custom alerting application that used Outlook as the alerting
treaming video is a very fashionable buzz phrase these days thanks to the pervasiveness of Internet video (which is, in turn, thanks, largely, to Flash). However, it’s also a widely
un Java System RFID Software is an RFID infrastructure framework that integrates data and RFID-enabled devices into enterprise application systems ranging from small projects to large deployments. Java System RFID
orting an existing Java Web application to a new framework is probably not at the top of most developers’ fun-stuff-to-do lists. In addition to the time of learning a new
uilding complex Web controls with rich-client interfaces often requires the integration of some client-side JavaScript code with the control’s server-side code. While in some cases this does not have to
ur daily lives revolve around a series of activities, decisions, and rules. For example, upon waking one of the first activities you do is probably to brush your teeth, followed











