devxlogo

We are an award-winning tech entrepreneurship website where trusted experts can provide value globally.

Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.

devxlogo

Trusted for 26 years

Over 30K Articles

1M+ Readers

Expert-reviewed

10K+ Tech Terms

As seen in:

microsoft logo
business_insider_logo
wired_logo
berkley
arstechnica_logo
hackernoon

The Latest

Send and Recieve Messages Using a CGI Java Application

The following code shows you how to send and receive CGI messages from a Java application: import java.net.*;import java.io.*;class POSTrequest{URL url=null;URLConnection URLcon=null;OutputStreamWriter OSW=null;BufferedReader BR=null;PrintStream PS=null;public void GetReady() { try {

Introduction to Cascading Style Sheets

ascading Style Sheets (CSS) are a powerful way to separate content from design in your Web Forms applications. Effective use of CSS is an easy way to maintain and consolidate

The Windows Communication Foundation: A Primer

he WCF is an incremental, yet evolutionary technology that brings all the formerly distinct and separate Microsoft connectivity technologies together under a single umbrella within the System.ServiceModel namespace. Included in

Building a Stored Procedure Generator

e all know that the most efficient way to access data from a database is to use stored procedures. For most applications, these stored procedures follow the same basic design

Book Excerpt: The 19 Deadly Sins of Software Security

his essential book for all software developers?regardless of platform, language, or type of application?outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors

Arrays of Functions

A pointer to a function refers to the memory address of the function. Just like arrays, the name of a function is the starting address of the function’s code. Here’s

Making Tables Read-only in Oracle

In Oracle, you can only control read/write capability for an entire tablespace, not for a single table within a tablespace. So, if you want all the tables in a tablespace

Modifying Client JavaScript Code at Runtime

You can make new tags/components using JavaScript blocks. Simply include a script iterating through all the script blocks in your page: etc… As soon as the browser renders the scriptblock,

Creating and Using Resource Files

Resource files are used in .NET to store culture-specific data all in one place, separate from the code. For example, suppose you are developing a multi-language Web site and you

Security Is Job One!

omputer data security has finally arrived as a front page news topic. A number of companies from Bank of America to ChoicePoint have finally raised the attention of consumers, business,

Two Faces of Mobility Comingle Freely at CTIA 2005

an Francisco?The organizers of this year’s CTIA Wireless IT and Entertainment conference aren’t trying to mask the show’s blatantly dualistic character. In fact, with its theme, “One Show. Two Personalities,”

Troubleshooting Web Parts and Deployment

his isn’t the article that I set out to write. While researching another article (coming soon) I soon realized there just isn’t a lot of good material on how to

Use Stored Procedures for Java Persistence

ost software applications require a persistence layer, such as a relational database, to store user data for later retrieval. As a Java developer, you have many choices for your application’s