
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
roductive developers and coding shops all maintain some type of custom code or scripts library, usually chock-full of code routines for common tasks such as string parsing, database operations, etc.
n the first article of this two-part Visual Studio Snippets series, I introduced snippets, how to use them, and how to create your own, as well as packaging them for
bfuscate. According to the Merriam-Webster dictionary, obfuscate is a transitive verb meaning to darken, to make obscure or to confuse. In the software engineering business, obfuscation refers to “the deliberate
uring a session at last week’s LinuxWorld Conference in San Francisco, Google’s Open Source Program Manager Chris DiBona showed slides of the search company’s growth?from a few servers in a
he World Wide Web has traditionally used a book or slideshow metaphor as the basis for navigation between hyperlinks. Clicking on a link is like flicking from one page to
evelopers often need to monitor a set of applications and perform recovery measures in the event of a failure. In my case, I had to design a monitoring server for
Consider an employee service, say in an SOA-based implementation, which exposes the following method: Employee getEmployeeInfo(int employeeId) Looking at this signature, Employee can be defined as struct because it would
This code scrolls the text left and right on the click event of < , >:
To check for the existence of a stored procedure, select the name from sysobjects where name=’mystoredprocedure’ and xtype=’p’.
Use this polymorphic technique to cheat the compiler and expose private information: See the code below.class A{public: virtual void f2() { printf(“in A::f2 “); }};class B: public A{private: void f2(int
Failing to release virtual machine resources results in a ‘memory leak.’ The following example is missing the ReleaseIntArrayElements call: jint * tempArray = env->GetIntArrayElements(jiArray, false);if (tempArray ){ return;}if (…) //
MI is the standard that everyone has heard about but few are sure what to do with. Beginning with this article, I will demonstrate some interesting value-added ideas on the
ne of the best features of developing COM+ based applications in standard three-tier presentation, business, and data access (DAL) layers is the simplicity of managing transactions distributed between the application’s
ava recently celebrated its 10th birthday at JavaOne in San Francisco. It’s come a long way in that time, and a decade is a long time in technology. It’s a
obust support for Web standards is now the norm rather than the exception. If you develop applications for a purely Microsoft-centric environment then you probably haven’t had to care much
our months ago, Microsoft publicized a list of features that could cause existing Visual C++ apps to break when migrated to Visual Studio 2005. Many of these features are core
n this world of emerging technologies and modern, ultra-small, and super-capable electronic devices, there is still a place of honor for printers. People haven’t completely switched to soft copies. There
very nerd loves the XMLHttpRequest. It supplies the functionality of which Web programmers’ dreams are made. Web applications start behaving like desktop applications. Things work as they’re “supposed to,” freeing
he time has come, at last, for a major update of Flash?Macromedia’s flagship animation and interactive development tool. Expected in early September, Flash 8 (Macromedia has officially dropped the useless
ingle sign-on (SSO) is a very hot topic. Businesses in every industry are eager to integrate legacy systems into newer applications, and SSO can alleviate the headaches users experience when
oday’s use of Web services in solutions doesn’t really realize the true potential of Web services. Oh yes. Web services programming is easy. Who likes those crazy angle brackets crossing
eb services have evolved into a standard means for integrating organizations using differing technologies running on heterogeneous systems and frameworks. A Web service is a business-logic component designed to be
To add line numbers in your VS.NET code window: Go to VS.NET?>Tools?>Options?>Text Editor. Choose the language of your choice and select the Line Number checkbox under Display. This will add
You can define parameters for the SqlDataSource control. If a parameter value is an empty string, the driver automatically converts that into a NULL value, which can lead to unexpected
Oftentimes, cursors are used to concatenate multiple columns into one string. For instance, you may want something like this to show as ‘A,B,C’ on your report (Table table_A): Id Char_Value1
If you need to access a database with Java, you need a driver. This is a list of the drivers available, what database they can access, who makes it, and
This algorithm helps you to retrieve all the elements contained in the first set (set1), but not in the second (set2). Here’s the template: templatevoid Diff(const T& set1, const T&
orporations encounter various scenarios in which they need parallel processing to achieve high throughput and better response times. For example, various financial institutions perform reconciliation as batch jobs at the
uilding enterprise Java applications is a challenging process in which you build, package, and deploy multiple components to a variety of environments. And these components will frequently depend on one
This installment of “The Baker’s Dozen” presents a Windows Forms database application that demonstrates some of the primary attributes of a distributed architecture. These attributes include authentication and connectivity, data











