
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
ulti threading is one of the most powerful concepts in programming. Using multithreading, you can break a complex task into multiple threads that execute independently of one another. One particularly
Java programmer seems to live in two worlds. One is the object-oriented world of classes, interfaces, methods, accessibility, and more advanced notions such as patterns, refactorings, aspects, and concerns. The
ocoon is a powerful tool for publishing content to multiple formats from XML. This second article of a two-part series describes how to integrate Cocoon with Lucene, a full text
n Part 2 we looked at associations, which are nothing more than references, but they can be directional and represent multiplicity. If we were restricted to our ability to generate
This query: select @@version provides the following information: Version installed Service Pack installed Edition installed Here’s a sample of the output: Microsoft SQL Server 2000 – 8.00.194 (Intel X86) Aug
Servlets can be configured using the initialization parameter. These parameters can be anything like username, password, URL, etc for accessing a database connection, the location of the configuration file, etc.
Validator controls automatically trigger validation checks for every postback?irrespective of whether you need validation or not. To prevent this, set CausesValidation=”False” for the control for which you do not need
Have you ever come across an application where you’re required to handle more than one set of heterogeneous data elements? Operations may include initialising, reading from, writing to, and passing
n Flash, components have the power to save you a great deal of time and frustration. These pluggable, self-contained units?consisting of handy combinations of graphics and/or code?are just dropped into
an Francisco, Calif.?”Ninety-nine percent of the people want to write secure code,” said panelist Ira Winkler, at the Secure Software Forum last week, “they just don’t know how.” Winkler, Global
t is no longer neccessary to creatively twist and bend Flash’s printing APIs to perform the more complex printing tasks like multi-page printing. Thanks to ActionScript 2.0 and Flash Player
he data access features in .NET changed the way developers write code by segregating the data providers into separate classes and namespaces, depending on the type of database that was
he Burlap/Hessian protocol is an alternative remote object invocation and Web services protocol supplied as an open source Java framework through Caucho Technology. If you want POJO (Plain Old Java
he phenomenal popularity of the new Firefox browser from Mozilla.org is no random happenstance. Web users around the world have discovered what dozens of reviewers pointed out back in its
he Visual Studio 2005 toolbox provides new controls in three different areas: Data, UI, and system components. Low-level members of the old data binding architecture are now better encapsulated in
espite fairly recent protestations to the contrary, it seems as if Microsoft has had Internet Explorer 7 planned all along. At the RSA Conference 2005 in San Francisco this week,
For some reason, if you install IIS after you’ve installed .NET, IIS will not recognize ASP.NET pages. To fix this, go to: Start?>Programs?>Microsoft Visual Studio.NET 2003?>Visual Studio.NET Tools?>Visual Studio .NET
In SQL Enterprise Manager, in the Data Design view, copy the Table Design by Select All (Ctrl + A) and copy it (Ctrl + C) to an Excel file to
Ever written a PL/SQL block of code to convert numbers to words? Try this easy line of code to accomplish the same task: SELECT TO_CHAR(TO_DATE(764,’J’), ‘JSP’) AS WORD_FORM FROM DUAL;
Eve been writing unit tests, and while you’re coding one test, you have ideas for another test? In order not to break your train of thought, leave a bookmark in
In most situations, it doesn’t make much sense to create vectors of pointers to the short datatype. Compare these two code samples: vector myvector; //bad code.short * pS = new
ML is a wonderful thing. It has empowered a whole new class of application?loosely-coupled Web services cooperating to form applications?with XML being the glue that binds them together through well-known,
“euristics” is a word to inspire fear and loathing among the non-technical. But actually, it’s one of the friendliest design-related concepts out there. This article suggests five heuristics for ensuring
ou never know when your software might be used by people who speak different languages. In a multinational company, branch offices need to share database applications. By localizing your product,
ust about everyone implements a roll-your-own security mechanism for his or her software applications. I’ve done it, many software companies have done it, and I am sure you have as
art I of this article (see “Snapshot Isolation in SQL Server 2005,” July/August, Volume 5, Issue 4) described the transaction-based SNAPSHOT isolation level. At the time Part I was written,
he new Java 2 Platform Standard Edition 5.0 (the developer version number is 1.5 and the code name is “Tiger”) provides many new features, among them is the ability to
eveloping Web applications has come a long way since the first days of HTML when everything had to be coded by hand. I remember the days before there were smart
he semi-annual Windows developer trade show VSLive! took its turn in San Francisco this week, giving the 2,000 attendees a look at how the promise inherent in some major architectural
ave you ever wanted to use a strongly-typed collection to bind your data presentation controls to, only to find that you have very limited sorting capabilities, if any at all?











