
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
The main reason to pass parameters by value is to improve performance, which is somewhat of a paradox, because this is also one of the main reasons to pass by
ast month I tried to encourage readers to embrace a couple of simple math concepts to expand the ol’ ActionScript skill set. I tried to show that by understanding some
equence diagrams are used to map out class interactions. A sequence diagram is made up of objects, each with its own object lifeline. Interactions between the objects occur by messages
here’s two things that most developers are (or should be) excited about in the upcoming Vista version of Windows (formerly codenamed Longhorn), and one of them is Avalon. Avalon is
ost enterprise applications today use database systems to persist data, and they utilize these data for various organizational needs. Often these applications need to store, retrieve, and manipulate date and
s Web applications become more sophisticated, developers increasingly need to be able to incorporate dynamic graphics and animation. Unfortunately, Web browsers were originally designed to display static HTML; displaying dynamic
ML Encryption provides end-to-end security for applications that require secure exchange of structured data. XML itself is the most popular technology for structuring data, and therefore XML-based encryption is the
One of the challenges of cross-platform development is managing your build environment. With so many platforms these days using the combination of Microsoft Visual Studio and an emulator to facilitate
JAX is catching on, but handling multiple XML responses on the client side is difficult. Current methods of easing the hassle ignore important programming principles that are known to help
any developers who work on high-volume transactional software (such as real-time financial or accounting systems) are skeptical of using Java’s System.currentTimeMillis() method for capturing transaction times. You’ll often hear the
tandard applications, of course, use a database, but if you’ve ever investigated the idea of building an application using only XML files as a data store, you know that it
t’s really not surprising that the first “killer app” in the world of personal computing was the spreadsheet. After all, a table filled with numbers is one of the simplest
mplementing XML processing in C++ can be a headache. Parsing and building XML documents with DOM takes a lot of coding and it’s slow, error prone, and not resistant to
here is great power today in databases, in technologies that gather and organize information, and in global, nearly-instant communications. And today’s developers understand and apply these powerful technologies in applications
A lambda expression enables you to define an unnamed function?directly on the call site of an algorithm. Such unnamed functions are chiefly useful in functional programming, generic libraries, and scientific
Assume that your Data Grid is not associated with any dataset. In the absence of any XML support functions, you can use the RenderControl method to extract the content into
For most of us, working with large databases is a day-to-day activity. All too often, backup and restoration are considerably slow—usually because of the constraints imposed on the tables. Take
penLaszlo, an open source framework sponsored by LaszloSystems, has attracted a significant attention after Earthlink, the second largest Internet Service Provider, announced that it will use OpenLaszlo technology for its
This code uses the Robot class to give you automatic keyboard and mouse control. import java.awt.*;import java.awt.event.*;import java.io.IOException;import javax.swing.*;public class RobotDemo extends JFrame implements ActionListener{ //Store Keystrokes in an array
You can use iterators for a STL set object to loop through the set elements 1 by 1. But did you know you can also increment the iterator by more
ML appears in some form in most modern applications?and often needs to be transformed from one form into another: merged, split, massaged, or simply reformatted into HTML. In most cases,
magine that you’re a developer at a company that wants to automate its warehouse inventory process. After the usual series of meetings, the managers agree with your original proposal to
n my book, “eXtreme .NET,” I introduce a team of developers who are learning how to improve their ability to deliver great software. In this article, you’ll follow this team
n the first article in this series, we explained the concept of associations in UML and showed how to implement them. This article takes that knowledge one step further and
ere you a little surprised recently that Sun’s J2ME Wireless Toolkit picked up several awards as product of the year in the mobile development tools area? I was. Not that
This function adds two long numbers together as if they were unsigned, and does not cause an overflow error. You may need this when implementing the SHA-1 Hashing function. ‘
When working in Query Analyzer, hightlight the table name in your SQL statement, then hit ‘Alt-F1’.
Sometimes you want to restrict users from saving the images on your Web pages. Use the following code to disable the right click menu in the browser: Disable Right Click
import java.net.*;import java.io.*;import java.util.*;import java.text.*;//Program to get all the cookies(name/pair values) from the URL passed as parameterpublic class GetCookieFromURL{ public static void main(String args[]) { try{ //create url by pass
While it’s usually best to use pointers for member variables rather than storing them by value, sometimes it’s better to store the member as a whole object, that is, to











