
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
There are times you don’t want your output to be cached on browsers. For instance, when a user is viewing their account balance, you want the data to be retrieved
The failure to deallocate previously allocated memory is known as a memory leak. A memory leak is one of those hard to detect bugs, and it may cause unpredictable behavior
Naming variables has a major effect on how hard it will be for a person to follow the code, whether it is the same person who wrote it or someone
Here’s an example: Code For Balance Class——————————————————————————–// Demo class for User-Defined Exceptions To Ensure The// Validity of Data Contained In A Classimport java.io.*;public class Balance{ int bal; public Balance(){ }
This small routine creates a link from all the tables of one .mdb file to another. First, you need to select reference ‘Microsoft ADOX’, your available version. Private Sub CreateLinkTables()
n the first part of this article series, you saw how to expose data via an ASP.NET Web service, in an XML format useful for all kinds of clients. By
ave you ever found yourself in the following scenario: You’ve created server-side Java applications for a production environment.You write a program that allocates external resources: connections to a database using
uring the past decade, I’ve witnessed remarkable change in the software industry’s overall approach to persistence. Though measuring Plain Old Java Object (POJO) solutions in terms of market share is
hen you write distributed programs with RMI, you want to restrict theactions performed by remotely loaded classes. Otherwise, you mayinadvertently allow unsecure code to access private systemresources. You can secure
Bulk I/O is a strenuous operation in terms of performance and resource allocation. For example, say you need to debug a container and wish to dump its content to cout
hen it comes to app server platforms, people can?and do?debate endlessly about which is the best for running enterprise-class applications. Is it the Microsoft .NET platform? Or one of many
he Web browser/Web server combination used today was originally designed to deliver HTML, which implicitly contains display information as well as data. But this doesn’t mean that the Web server
There are two methods to send info and get a response via HTTP. The second (alternate) method works for both .NET and VB6, but it requires DLL reference (take your
When you compile a program the compiler first uses a preprocessor to analyze the code. The #define directive can be used to either define a constant number or function or
The following code prints out an error report to NotePad. Private sub cmdPrintError_Click Dim curDB As Database Dim rs As Recordset Dim lSQL As String Dim retVal As Variant Open
Use this code to obtain the rowcount in JDBC without looping through the resultset. try { // Create a scrollable result set. stmt = conn.createStatement( ResultSet.TYPE_SCROLL_SENSITIVE, ResultSet.CONCUR_READ_ONLY); // Set a
Oftentimes, when I’m creating stored procedures, I forget to grant execute permissions to my user(s). Here is a stored procedure that will do this for you by simply passing in
n February, DevX Editorial Director Michael McCarthy and Editor-in-chief Lori Piquet sat down with four developers?two in the U.S. and two in Europe?to discuss the mobilization of the enterprise. Why
ith an estimated 100 million Java-enabled handsets on the market today?a number projected to grow to 1 billion by 2006?it’s clear that the opportunity for wireless developers is enormous. However,
isual Basic applications are becoming more connected, and developers are trying to Web-enable their applications by supporting HTTP or FTP. Often this requires using the Microsoft Internet Transfer control or
he Java 2 Platform, Standard Edition (J2SE) 1.5 (codename: Tiger) has some language-level enhancements that Sun designed to make programmers’ lives much easier. This article takes a gander at some
String processing in VB is usually a very slow task. Often, people process strings letter by letter and construct a larger trinf afterwards from small bits. A better way would
The problem with the collection API is that you cannot put primitive data types into it. Instead, you must use their object counter parts. For instance, you have to use
Arrays are similar to ideas in mathematics. An array stores many values in memory using only one name. “Array” in programming means approximately the same thing as array, matrix, or
rench writer Victor Hugo once said, “We see past time in a telescope and present time in a microscope. Hence the apparent enormities of the present.” Yet, when it comes
Suppose a class requires a “springboard” for calling a set of member functions which share the same signature. For example, the springboard might create some parameters to pass to these
This is required in B2B integration when one vendor logs into a system and upon validation a success message needs to be displayed and depending upon user’s request, the user
he Chain of Responsibility (COR) pattern is a behavioral pattern for decoupling requests from request handlers. It transparently routes requests to the appropriate handler and can (depending on the dispatching
wo major limitations in the Enterprise JavaBeans (EJB) specification make it difficult to develop multi-threaded EJB applications: New user threads cannot be created inside EJB Container. EJB methods cannot be
User language settings can be detected in one of the two following ways: Using the cultureinfo class current culture property: Using the request object’s userlanguages collection: Note: The UserLanguages collection











