devxlogo

We are an award-winning tech entrepreneurship website where trusted experts can provide value globally.

Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.

devxlogo

Trusted for 26 years

Over 30K Articles

1M+ Readers

Expert-reviewed

10K+ Tech Terms

As seen in:

microsoft logo
business_insider_logo
wired_logo
berkley
arstechnica_logo
hackernoon

The Latest

Release Resources with a Shutdown Hook

JDK 1.3 introduced the addShutdownHook() method to the java.lang.Runtime class. Implementing a shutdown hook is useful if you need to take some action right before your app stops running. To

Build a Web-safe Color Palette Application

ometimes, deciding on a color scheme for a site is more of a problem than is implementing it. I’ve sat on committees intended to design Web sites by consensus and

Cross the Gap Between PHP and Java

hese days, using sophisticated application frameworks to build your network server applications is understandable, but sometimes such frameworks are overkill. When you strip networking down to its bare essentials, network

Build ColdFusion Apps that Last with Mach-II

ver heard this story? Developer meets company, company meets developer, they fall in love. Together, they develop a ColdFusion application of great beauty, bound to last forever. But soon developer

Above and Beyond DHTML Menus

p until now, the heart of a Web page was HTML, but that’s changing; HTML is simply not flexible enough to meet modern Web development needs. The element, for example,

Perimeter Security Ain’t What It Used to Be, Experts Say

f complexity truly breeds insecurity, your perimeter security can’t be trusted to only the traditional defenses of firewalls and intrusion detection systems (IDS) anymore. Web services, network interconnectedness, wireless connectivity,

Search a Directory for Files with a Pattern

The following is a powerful UNIX command that searches for files or folder names containing a particular pattern:1 $>grep -l “main(String” `find . -name *.java -print` This particular code will

Eliminate Data Caching from Your Browser

There are times you don’t want your output to be cached on browsers. For instance, when a user is viewing their account balance, you want the data to be retrieved

Debugging the Memory Leaks in MS VC++ 6.0

The failure to deallocate previously allocated memory is known as a memory leak. A memory leak is one of those hard to detect bugs, and it may cause unpredictable behavior

A Convention for Naming Variables

Naming variables has a major effect on how hard it will be for a person to follow the code, whether it is the same person who wrote it or someone

How to Write Userdefined Exceptions

Here’s an example: Code For Balance Class——————————————————————————–// Demo class for User-Defined Exceptions To Ensure The// Validity of Data Contained In A Classimport java.io.*;public class Balance{ int bal; public Balance(){ }

Linking Your Access Databases with ADOX

This small routine creates a link from all the tables of one .mdb file to another. First, you need to select reference ‘Microsoft ADOX’, your available version. Private Sub CreateLinkTables()

Use JVM Shutdown Hooks to Optimize Resources

ave you ever found yourself in the following scenario: You’ve created server-side Java applications for a production environment.You write a program that allocates external resources: connections to a database using

For JDO, the Time Is Now

uring the past decade, I’ve witnessed remarkable change in the software industry’s overall approach to persistence. Though measuring Plain Old Java Object (POJO) solutions in terms of market share is

Installing an RMI Security Manager

hen you write distributed programs with RMI, you want to restrict theactions performed by remotely loaded classes. Otherwise, you mayinadvertently allow unsecure code to access private systemresources. You can secure

WebRequest & WebResponse

There are two methods to send info and get a response via HTTP. The second (alternate) method works for both .NET and VB6, but it requires DLL reference (take your

The #define Directive

When you compile a program the compiler first uses a preprocessor to analyze the code. The #define directive can be used to either define a constant number or function or

Print an Error Report with NotePad

The following code prints out an error report to NotePad. Private sub cmdPrintError_Click Dim curDB As Database Dim rs As Recordset Dim lSQL As String Dim retVal As Variant Open

Retrieve the rowCount Without Looping

Use this code to obtain the rowcount in JDBC without looping through the resultset. try { // Create a scrollable result set. stmt = conn.createStatement( ResultSet.TYPE_SCROLL_SENSITIVE, ResultSet.CONCUR_READ_ONLY); // Set a

Grant SQL Execute Permissions to a User

Oftentimes, when I’m creating stored procedures, I forget to grant execute permissions to my user(s). Here is a stored procedure that will do this for you by simply passing in

Taking the Enterprise Mobile: Developer Roundtable

n February, DevX Editorial Director Michael McCarthy and Editor-in-chief Lori Piquet sat down with four developers?two in the U.S. and two in Europe?to discuss the mobilization of the enterprise. Why

WinInet API Programming

isual Basic applications are becoming more connected, and developers are trying to Web-enable their applications by supporting HTTP or FTP. Often this requires using the Microsoft Internet Transfer control or

J2SE 1.5: Java’s Evolution Continues

he Java 2 Platform, Standard Edition (J2SE) 1.5 (codename: Tiger) has some language-level enhancements that Sun designed to make programmers’ lives much easier. This article takes a gander at some

Faster String Processing

String processing in VB is usually a very slow task. Often, people process strings letter by letter and construct a larger trinf afterwards from small bits. A better way would