
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
For some reason, if you install IIS after you’ve installed .NET, IIS will not recognize ASP.NET pages. To fix this, go to: Start?>Programs?>Microsoft Visual Studio.NET 2003?>Visual Studio.NET Tools?>Visual Studio .NET
In SQL Enterprise Manager, in the Data Design view, copy the Table Design by Select All (Ctrl + A) and copy it (Ctrl + C) to an Excel file to
Ever written a PL/SQL block of code to convert numbers to words? Try this easy line of code to accomplish the same task: SELECT TO_CHAR(TO_DATE(764,’J’), ‘JSP’) AS WORD_FORM FROM DUAL;
Eve been writing unit tests, and while you’re coding one test, you have ideas for another test? In order not to break your train of thought, leave a bookmark in
In most situations, it doesn’t make much sense to create vectors of pointers to the short datatype. Compare these two code samples: vector myvector; //bad code.short * pS = new
ML is a wonderful thing. It has empowered a whole new class of application?loosely-coupled Web services cooperating to form applications?with XML being the glue that binds them together through well-known,
“euristics” is a word to inspire fear and loathing among the non-technical. But actually, it’s one of the friendliest design-related concepts out there. This article suggests five heuristics for ensuring
ou never know when your software might be used by people who speak different languages. In a multinational company, branch offices need to share database applications. By localizing your product,
ust about everyone implements a roll-your-own security mechanism for his or her software applications. I’ve done it, many software companies have done it, and I am sure you have as
art I of this article (see “Snapshot Isolation in SQL Server 2005,” July/August, Volume 5, Issue 4) described the transaction-based SNAPSHOT isolation level. At the time Part I was written,
he new Java 2 Platform Standard Edition 5.0 (the developer version number is 1.5 and the code name is “Tiger”) provides many new features, among them is the ability to
eveloping Web applications has come a long way since the first days of HTML when everything had to be coded by hand. I remember the days before there were smart
he semi-annual Windows developer trade show VSLive! took its turn in San Francisco this week, giving the 2,000 attendees a look at how the promise inherent in some major architectural
ave you ever wanted to use a strongly-typed collection to bind your data presentation controls to, only to find that you have very limited sorting capabilities, if any at all?
++ pundits recommend that you replace built-in arrays with st::vector across the board. Sometimes however, built-in arrays are unavoidable due to their unsurpassed efficiency or because your app must interact
This C++ class tracks elapsed time. The mark() method is called at the point of interest, after which there are methods to retrieve the elapsed time between points, total time,
VB6 introduced the CallByName function which allows you to call a function or subroutine using the subroutine or function name stored as a string value. While this function still works
Both select scope_identity and select @@identity return the identity column value of a newly inserted row. However, @@identity is not reliable because it works in a session level. So, suppose
In WebLogic 6.1, the default state for the Pass By Reference parameter is true. This is not so in IBM’s WebSphere. To enable the Pass By Reference parameter in WebSphere,
C++ does not support the nested functions. However, you can use local classes to simulate the effects of nested functions. Take the scenario given below: int get_1 (int y){ int
QL Server 2005 or “Yukon” is going to be a major SQL Server update containing updates to nearly every facet of the program, including T-SQL. Microsoft has introduced a number
ames and mobile devices seem to be a natural fit. Since MIDP 1.0 first became available, the majority of applications written for the platform have been games. As MIDP grew
he Struts Web application framework facilitates building robust Web applications. Java Authentication and Authorization Services (JAAS) is a rich API for adding pluggable security modules to applications. These powerful services
lthough Crystal Reports provides many outstanding capabilities to help build and deliver sophisticated presentation output, I’ll present a proven collection of reusable practices and methodologies that you can apply across
t seems that every Web site you go to nowadays has some kind of survey, feedback, or entertainment mechanism to evaluate site visitors and their goals. Surveys are a valuable
urlingame, Calif.—The Open Source Initiative (OSI), the non-profit organization that manages the Open Source Definition and certifies open-source licenses, lists nearly 60 approved licenses on its Web site—and at the
ost game programs follow the same recipe?the game must gather input from the user, process that input and any other data, and render objects to the screen. Usually, the program
n Part 1 of this series, you learned that, by default, the Report Server uses Windows-based security to authenticate and authorize incoming requests based on the Windows identity of the
ne of my personal pet peeves is when I go to a conference or user group meeting and someone is doing a marketecture demo. That is, they are showing how
ost data access technologies provide a way for you to query the schema of a database, and obtain information about the tables, stored procedures, data types, users, and other content











