
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
Application Verifier is a tool for testing user-mode applications for compatibility with MS Windows XP. It comes in handy when you’re troubleshooting issues like common programming mistakes related to memory
‘ll be honest. I’ve always been a sucker for voice-navigated applications. At the first startup I worked at, two of us were given Macintosh Quadras as development workstations, and we
any major product releases have a dizzyingly long list of new features and enhancements?often introduced atop a product that is in many cases so complex and feature-ridden that it’s already
ow can I add a fade transition when I load, or unload, external SWF movies? This question arises because, when loading a movie, the loaded content begins to appear as
tarting with SQL Server 2000, Microsoft added the concept of notification services to their flagship database engine. SQL Server Notification Services lets you generate and send notifications whenever some criterion
ne of the most common errors Java programmers make when they first learn multi-threaded programming is to misunderstand locks. They believe that locking an object prevents access to its fields
To include characters in your mask that are also part of the set of mask syntax characters, escape them by using the backslash () character in front of the character
Use this code to find information?such as the method name or the parameters?of a dynamic class: import java.lang.reflect.*;public class DynMethodNames{ public static void main(String a[]) { try{ //passing class name
StringBuilder has an Append method that returns a reference to itself. This is useful for when you want to append several items in one go. The following code is an
Everybody knows that the alert() function in JavaScript is used to display messages in a dialog box. For example, the following code: alert(‘Hello Prakash’); will pop up with this message:
I found this out trying to work around a problem with an object shared across threads (yes, it was bad programming, but I still had to work around it). By
ntegrating old and new components and services using a service-oriented architecture (SOA) requires an infrastructure that can connect any component or service, regardless of location, messaging protocol, and message format.
ecently, I was talking with a Java developer who was fairly new to the SAP world but claimed to already be an ABAP expert. He was commenting on the ABAP
he Apache Software Foundation’s proposal of an open source version of Java 2 Standard Edition (J2SE) has the “Father of Java” James Gosling puzzled. “It’s often difficult to get a
esting is an integral part of any development process. JUnit, an open-source, regression-testing framework written by Erich Gamma and Kent Beck is a popular tool for building Java unit tests.
ong compilation time is an issue of concern for many large-scale C++ projects. In some cases, a typical build cycle takes up a whole night or an entire weekend. This
ometimes runtime performance requirements determine which programming language I use. For flat out runtime performance, I have always found that natively compiled Common Lisp or C++ really do the trick.
riting networked applications is one of the most interesting aspects of programming. It is both rewarding and intriguing to see your applications successfully communicating over the network. In this first
ASP.NET Web Forms post back to themselves?even if you add an explicit action attribute in the tag, ASP.NET overrides that action and posts the form to the original filename. You
This code shows how to display specific itemdata in a ComboBox. Currently, only the listindex property is available to navigate through a ComboBox. ‘ Consider a set of employee details’
Interprocess synchronization has always been classified as a “slow” operation, but that is largely only because the Windows implementation requires switching to kernel mode (an expensive operation) each time you
SE uses security tokens internally to represent security claims from Web service methods. The security tokens let WSE authenticate the user, validate the password, and check whether the user has
o, Web services are big and getting bigger, but what does that mean to Java development, specifically J2ME, for mobile devices? Until recently, the answer was “not much” unless you
his article explains the major components of Microsoft Reporting Services’ ad-hoc architecture and semantic model, and walks you through an end-to-end example that demonstrates how to author, manage, and deliver
he OpenBSD team prides itself on producing one of the most?if not the most?secure operating systems in the world. If you are concerned about keeping the sensitive data within your
he Spring framework, a lightweight open source J2EE container previously featured on these pages, is about to introduce a significant new feature as part of its already impressive offering. With
Be careful how you assign data members during initialization. For example, consider the following code: class test{ public: test (int y) : j (y), i(j) { } private: int i;
Suppose you have a table and you need to give styles to all the tags. Using inheritance to do this helps you avoid generating more content to be delivered to
Assume that an application creates a new table every month. The table name can be coined using some pattern, like sales0501, sales0502,, etc. To identify whether a particular table exists
Suppose you have a user control named TestControl in your .aspx page. Further, suppose that TestControl contains a textbox named txtFirstName. To access txtFirstName in your aspx page using JavaScript,











