
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
Assume that your Data Grid is not associated with any dataset. In the absence of any XML support functions, you can use the RenderControl method to extract the content into
For most of us, working with large databases is a day-to-day activity. All too often, backup and restoration are considerably slow—usually because of the constraints imposed on the tables. Take
penLaszlo, an open source framework sponsored by LaszloSystems, has attracted a significant attention after Earthlink, the second largest Internet Service Provider, announced that it will use OpenLaszlo technology for its
This code uses the Robot class to give you automatic keyboard and mouse control. import java.awt.*;import java.awt.event.*;import java.io.IOException;import javax.swing.*;public class RobotDemo extends JFrame implements ActionListener{ //Store Keystrokes in an array
You can use iterators for a STL set object to loop through the set elements 1 by 1. But did you know you can also increment the iterator by more
ML appears in some form in most modern applications?and often needs to be transformed from one form into another: merged, split, massaged, or simply reformatted into HTML. In most cases,
magine that you’re a developer at a company that wants to automate its warehouse inventory process. After the usual series of meetings, the managers agree with your original proposal to
n my book, “eXtreme .NET,” I introduce a team of developers who are learning how to improve their ability to deliver great software. In this article, you’ll follow this team
n the first article in this series, we explained the concept of associations in UML and showed how to implement them. This article takes that knowledge one step further and
ere you a little surprised recently that Sun’s J2ME Wireless Toolkit picked up several awards as product of the year in the mobile development tools area? I was. Not that
This function adds two long numbers together as if they were unsigned, and does not cause an overflow error. You may need this when implementing the SHA-1 Hashing function. ‘
When working in Query Analyzer, hightlight the table name in your SQL statement, then hit ‘Alt-F1’.
Sometimes you want to restrict users from saving the images on your Web pages. Use the following code to disable the right click menu in the browser: Disable Right Click
import java.net.*;import java.io.*;import java.util.*;import java.text.*;//Program to get all the cookies(name/pair values) from the URL passed as parameterpublic class GetCookieFromURL{ public static void main(String args[]) { try{ //create url by pass
While it’s usually best to use pointers for member variables rather than storing them by value, sometimes it’s better to store the member as a whole object, that is, to
pplications use many forms of configuration data, storing settings that are used in applications, enterprise, client computers, and user settings. The Configuration Management Application Block (CMAB) is typically used for
he MySQL Migration Suite facilitates the movement of data from a proprietary database application. This MySQL product suite consists of three tools: MySQL Migration Toolkit, a package capable of reverse
t’s not often you see Microsoft adopting a language from the world of Open Source Software (OSS), but IronPython is just such a project and has gathered a growing following
QL Server 2005’s HTTP/SOAP endpoints provide SQL Server developers with new capabilities for using Web services within SQL Server. It’s worth noting though that Web services aren’t new to SQL
San Francisco, Calif.?Sun claims 4.5 million Java developers worldwide, but apparently that’s not nearly enough. “It’s to our competitive strategic advantage to cultivate the largest community in the world,” said
Usually, you pass const reference parameters to functions like this: class OneKind;class AnotherKind;class Example{ public: Example( const OneKind &inParam ); // conversion operator Example( const Example &inOriginal ); // copy
Step 1: Draw any graphics objects in the applet as shown below: public void drawDemo(int w, int h, Graphics2D g2) { GeneralPath p = new GeneralPath(GeneralPath.WIND_EVEN_ODD); p.moveTo(w*.2f, h*.25f); // adds
he UML association is a concept that is often misunderstood. The most common misperception is that an association is the same as a pointer, or maybe two pointers, in a
This code limits the focus in a big MSFlexGrid to a certain range of columns and rows. It limits movement by using the entercell method. It controls the use of
If the data in your database looks like “SomeValue or other HTML, you have to do something to prevent the browser from showing the tags, when you want just to
ver the past few months, there’s been an increasing amount of buzz about Asynchronous JavaScript and XML (AJAX) programming. It’s about time. AJAX is the new term for a technology
For the benefit of the newbies in SQL Server, here’s a list of a few basic queries: How to determine whether a table column exists in a table: Run this
eople receive many notifications daily: weather updates, news updates, updates about stock prices, or a current account balance via a SMS message. But how can you build such notification applications
alm OS-based handhelds and smartphones are powerful, pervasive computing devices that have changed the lives of many users through the applications they house. As a Java developer, why not tap
o call Visual Studio .NET “pretty cool” is getting a little cliche. You know it. I know it. We’ve created Web applications in minutes, figured out the power behind the











