
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
Have you ever come across an application where you’re required to handle more than one set of heterogeneous data elements? Operations may include initialising, reading from, writing to, and passing
n Flash, components have the power to save you a great deal of time and frustration. These pluggable, self-contained units?consisting of handy combinations of graphics and/or code?are just dropped into
an Francisco, Calif.?”Ninety-nine percent of the people want to write secure code,” said panelist Ira Winkler, at the Secure Software Forum last week, “they just don’t know how.” Winkler, Global
t is no longer neccessary to creatively twist and bend Flash’s printing APIs to perform the more complex printing tasks like multi-page printing. Thanks to ActionScript 2.0 and Flash Player
he data access features in .NET changed the way developers write code by segregating the data providers into separate classes and namespaces, depending on the type of database that was
he Burlap/Hessian protocol is an alternative remote object invocation and Web services protocol supplied as an open source Java framework through Caucho Technology. If you want POJO (Plain Old Java
he phenomenal popularity of the new Firefox browser from Mozilla.org is no random happenstance. Web users around the world have discovered what dozens of reviewers pointed out back in its
he Visual Studio 2005 toolbox provides new controls in three different areas: Data, UI, and system components. Low-level members of the old data binding architecture are now better encapsulated in
espite fairly recent protestations to the contrary, it seems as if Microsoft has had Internet Explorer 7 planned all along. At the RSA Conference 2005 in San Francisco this week,
For some reason, if you install IIS after you’ve installed .NET, IIS will not recognize ASP.NET pages. To fix this, go to: Start?>Programs?>Microsoft Visual Studio.NET 2003?>Visual Studio.NET Tools?>Visual Studio .NET
In SQL Enterprise Manager, in the Data Design view, copy the Table Design by Select All (Ctrl + A) and copy it (Ctrl + C) to an Excel file to
Ever written a PL/SQL block of code to convert numbers to words? Try this easy line of code to accomplish the same task: SELECT TO_CHAR(TO_DATE(764,’J’), ‘JSP’) AS WORD_FORM FROM DUAL;
Eve been writing unit tests, and while you’re coding one test, you have ideas for another test? In order not to break your train of thought, leave a bookmark in
In most situations, it doesn’t make much sense to create vectors of pointers to the short datatype. Compare these two code samples: vector myvector; //bad code.short * pS = new
ML is a wonderful thing. It has empowered a whole new class of application?loosely-coupled Web services cooperating to form applications?with XML being the glue that binds them together through well-known,
“euristics” is a word to inspire fear and loathing among the non-technical. But actually, it’s one of the friendliest design-related concepts out there. This article suggests five heuristics for ensuring
ou never know when your software might be used by people who speak different languages. In a multinational company, branch offices need to share database applications. By localizing your product,
ust about everyone implements a roll-your-own security mechanism for his or her software applications. I’ve done it, many software companies have done it, and I am sure you have as
art I of this article (see “Snapshot Isolation in SQL Server 2005,” July/August, Volume 5, Issue 4) described the transaction-based SNAPSHOT isolation level. At the time Part I was written,
he new Java 2 Platform Standard Edition 5.0 (the developer version number is 1.5 and the code name is “Tiger”) provides many new features, among them is the ability to
eveloping Web applications has come a long way since the first days of HTML when everything had to be coded by hand. I remember the days before there were smart
he semi-annual Windows developer trade show VSLive! took its turn in San Francisco this week, giving the 2,000 attendees a look at how the promise inherent in some major architectural
ave you ever wanted to use a strongly-typed collection to bind your data presentation controls to, only to find that you have very limited sorting capabilities, if any at all?
++ pundits recommend that you replace built-in arrays with st::vector across the board. Sometimes however, built-in arrays are unavoidable due to their unsurpassed efficiency or because your app must interact
This C++ class tracks elapsed time. The mark() method is called at the point of interest, after which there are methods to retrieve the elapsed time between points, total time,
VB6 introduced the CallByName function which allows you to call a function or subroutine using the subroutine or function name stored as a string value. While this function still works
Both select scope_identity and select @@identity return the identity column value of a newly inserted row. However, @@identity is not reliable because it works in a session level. So, suppose
In WebLogic 6.1, the default state for the Pass By Reference parameter is true. This is not so in IBM’s WebSphere. To enable the Pass By Reference parameter in WebSphere,
C++ does not support the nested functions. However, you can use local classes to simulate the effects of nested functions. Take the scenario given below: int get_1 (int y){ int
QL Server 2005 or “Yukon” is going to be a major SQL Server update containing updates to nearly every facet of the program, including T-SQL. Microsoft has introduced a number











