
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
In a normal application development environment, you will likely need to use encrypted columns to store passwords if you are using a custom users table. The need for encrypted columns
atabases are everywhere. In IT, you can’t build a substantial application without providing tables to store the data that the application will rely on (properties, configuration settings, etc.) and process.
toring and retrieving information for most applications usually involves some form of interaction with a relational database. This has presented a fundamental problem for developers for quite some time since
n recent months it’s become apparent that every computer system, regardless of operating system or programming language, bears a security risk. All computer software exposes attack surfaces to viruses and
Microsoft VS.NET provides design-time support for form inheritance. A derived form can be added to your solution by right-clicking on your project in the Solution Explorer window and choosing “Add…”
Ever deleted some tables accidently and had to waste your time doing them all over again? Oracle, in conjunciton with Triggers, provides an easy solution to this problem. First, create
You can use the generate() algorithm to fill up a sequence container with values that you generate by repeatedly calling a function. This algorithm takes three arguments. The first two
At times, the width of a table column is so constrained that it obscures the data. Sometimes, the data is obscured because data itself too large for the cell. To
You must set Checked property for each ListViewItem to False to clear all the checked items. ‘Declare the ListViewItemDim lvItem As ListViewItem’ Change each item’s Checked property to FalseFor Each
lasses are only the first step to understanding UML. In my last article I discussed classes in UML and how they are coded using C#. In this article I will
spect-oriented programming (AOP), a contemporary programming technology with a large number of supporters, is in essence an improved version of object-oriented (OO) programming technology that enables program objects to be
Use the following code to make text scroll vertically: Vertical ScrollerThis is Vertical Scrollerwww.devx.com
Have you ever wanted to draw or write something on top of another window using GDI? It can be done by obtainig a DC to the desktop window and then
Posting forms in Java is easy. All you need is just a HTML code snippet. Here’s an example: Your Email : * Message : *
Suppose you’ve got a user interface class with many user options that you need to set/get at the same time. Here’s one way to implement this: class CUI{public: CUI() :
class Mysingleton{ private Mysingleton objsingleton = null; private Mysingleton() { } //single way to get its instance. public Mysingleton getInstance() { if(objsingleton == null) { objsingleton = new Mysingleton(); }
Use this code: if object_id(‘tblTemp’)0 drop table tblTempCreate Table tblTemp (Field1 varchar(5),Field2 Varchar(100))insert into tblTempselect ‘C1’ Field1, ‘Value1,Value2’ Field2Unionselect ‘C2’ Field1, ‘Value3,Value4’ Field2 if object_id(‘tblTempOutPut’)0 drop table tblTempOutPutselect * into
nce upon a not-long-ago, Web services were the future killer application that you just had to have a grasp on. While they are a very important part of most architectures
odeling, and especially UML, is becoming more and more important in software development. After you’ve participated in a number of software projects, you will realize that developers use models in
Suppose you want to put the contents of a page right up against the edges of the browser’s viewport. While you can force this using absolute positioning, there is a
Sometimes you need to encrypt certain data stored in your database?data like passwords and other condfidential information. Oracle Obfuscation is a technique in which data is encrypted or decrypted using
n an article published last week on DevX entitled “Why EDI Must Die“, the author, Jeremy Jones, gives several reasons why he believes XML is superior to the X12 format
nce upon a time building a Web front to a store was an enormous task, involving expensive specialists. However, over time, technologies have developed that allow anybody to build their
any developers seek sophisticated third-party alternatives. In this article, I’ll present a set of classes for the DataGrid to help address some of the more common struggles. Although third-party tools
n all the excitement about SQL Server 2005 (formerly codenamed Yukon), most people tend to focus on the .NET integration. But the native support for XML might turn out to
icrosoft recently launched the Microsoft Patterns and Practices section of their Web site, offering several complete architectural and design application blocks, complete with source code, that you can use in
avigational menus are an obvious requirement for many Web applications, used in nearly every multi-page site, from family sites to multinational e-commerce systems. Until now, developers have relied on third
he Python language has a few characteristics that make it great for unit testing: It integrates very well with the platform it runs on, so you can write tests that
view is a great UI concept for IDEs that enables developers to encapsulate a set of functionality. It is typically used in a “non-model” fashion, meaning the functionality is visible
lectronic Data Interchange (EDI), a data format used for inter-business messaging, has been partially responsible for reducing costs and increasing productivity in the manufacturing and services industries. Over the years,











