devxlogo

We are an award-winning tech entrepreneurship website where trusted experts can provide value globally.

Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.

devxlogo

Trusted for 26 years

Over 30K Articles

1M+ Readers

Expert-reviewed

10K+ Tech Terms

As seen in:

microsoft logo
business_insider_logo
wired_logo
berkley
arstechnica_logo
hackernoon

The Latest

Enhance the Appearance of Your Web DataGrid

One way to enhance a Web DataGrid’s appearance is to alternate the background color of the row. This requires only two lines of code. For example, to display an even

XDoclet Meets Eclipse: Code Generation Made Easy

Doclet is a code generation engine that enables a concept known as Attribute-Oriented Programming. To use XDoclet, a programmer adds metadata (attributes) for classes and methods within the JavaDoc for

Free Your C# Apps from .NET Platforms

ainsoft’s Visual MainWin is a revolutionary product that allows you to develop applications in C# and deploy and run them on J2EE application servers (for a detailed review, click here).

Create a Sortable Column Dynamically

There are times when sorting your resultset by the primary key doesn’t accomplish what you need. One way to get around this is to create a sortable column dynamically in

USE API Programming to Determine Whether a File Exists

Put this code in a BAS Module: Public Const INVALID_HANDLE_VALUE = -1Public Const MAX_PATH = 260Public Type FILETIME dwLowDateTime As Long dwHighDateTime As LongEnd TypePublic Type WIN32_FIND_DATA dwFileAttributes As Long

Change the Look and Feel of a Java Application

Use the following code to give your Java app a Windows look and feel: UIManager.setLookAndFeel(“com.sun.java.swing.plaf.windows.WindowsLookAndFeel”); Ensure the class “com.sun.java.swing.plaf.windows.WindowsLookAndFeel” isin your jvm bootstrap classpath. Mostly it can be found in

Fix Up Your HTML with HTML Tidy and .NET

ou may never have heard of it, but HTML Tidy isn’t new. HTML Tidy is a once-free but now open source application. It was originally written in C as a

Recover Dropped Tables in DB2

lot of ugly things can happen in the early morning hours when you are frantically trying to meet a deadline. For example, your mind can falter for a split second

Object Instance Comparison

Sometimes you need to know if is a specific instance of an object, is the one you’re looking for.objptr() provides a nice VB-ish way to compre object pointers. So, you

Release Resources with a Shutdown Hook

JDK 1.3 introduced the addShutdownHook() method to the java.lang.Runtime class. Implementing a shutdown hook is useful if you need to take some action right before your app stops running. To

Build a Web-safe Color Palette Application

ometimes, deciding on a color scheme for a site is more of a problem than is implementing it. I’ve sat on committees intended to design Web sites by consensus and

Cross the Gap Between PHP and Java

hese days, using sophisticated application frameworks to build your network server applications is understandable, but sometimes such frameworks are overkill. When you strip networking down to its bare essentials, network

Build ColdFusion Apps that Last with Mach-II

ver heard this story? Developer meets company, company meets developer, they fall in love. Together, they develop a ColdFusion application of great beauty, bound to last forever. But soon developer

Above and Beyond DHTML Menus

p until now, the heart of a Web page was HTML, but that’s changing; HTML is simply not flexible enough to meet modern Web development needs. The element, for example,

Perimeter Security Ain’t What It Used to Be, Experts Say

f complexity truly breeds insecurity, your perimeter security can’t be trusted to only the traditional defenses of firewalls and intrusion detection systems (IDS) anymore. Web services, network interconnectedness, wireless connectivity,

Search a Directory for Files with a Pattern

The following is a powerful UNIX command that searches for files or folder names containing a particular pattern:1 $>grep -l “main(String” `find . -name *.java -print` This particular code will

Eliminate Data Caching from Your Browser

There are times you don’t want your output to be cached on browsers. For instance, when a user is viewing their account balance, you want the data to be retrieved

Debugging the Memory Leaks in MS VC++ 6.0

The failure to deallocate previously allocated memory is known as a memory leak. A memory leak is one of those hard to detect bugs, and it may cause unpredictable behavior

A Convention for Naming Variables

Naming variables has a major effect on how hard it will be for a person to follow the code, whether it is the same person who wrote it or someone

How to Write Userdefined Exceptions

Here’s an example: Code For Balance Class——————————————————————————–// Demo class for User-Defined Exceptions To Ensure The// Validity of Data Contained In A Classimport java.io.*;public class Balance{ int bal; public Balance(){ }

Linking Your Access Databases with ADOX

This small routine creates a link from all the tables of one .mdb file to another. First, you need to select reference ‘Microsoft ADOX’, your available version. Private Sub CreateLinkTables()

Use JVM Shutdown Hooks to Optimize Resources

ave you ever found yourself in the following scenario: You’ve created server-side Java applications for a production environment.You write a program that allocates external resources: connections to a database using

For JDO, the Time Is Now

uring the past decade, I’ve witnessed remarkable change in the software industry’s overall approach to persistence. Though measuring Plain Old Java Object (POJO) solutions in terms of market share is

Installing an RMI Security Manager

hen you write distributed programs with RMI, you want to restrict theactions performed by remotely loaded classes. Otherwise, you mayinadvertently allow unsecure code to access private systemresources. You can secure