Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
The .NET Framework enforces secuity at several levels. For example, assemblies downloaded from the Internet have very limited permissions (especially after installing the Service Pack 1 of the Framework). This
VB6 developers can use the App.PrevInstance property to check whether there is another instance of the same process already running on the current machine. This property isn’t available any longer
While you can access individual pixels of a bitmap by means of the GetPixel and SetPixel methods of the Bitmap object, in practice you seldom want to use these methods,
It is a common feature in an application to require the current date time to be displayed in a text field or something similar.This can be done easily in PalmOS
‘****************************************************’Written By KNR’Excel Sheet Reading’Read Excel File Using ADO’You can use Microsoft EXCEL Driver’****************************************************Public Function Read_Excel(ByVal sFile As String) As ADODB.Recordset On Error GoTo fix_err Dim rs As ADODB.Recordset Set
Shrinking a transaction log in SQL Server can be tricky, especially if you need it shrunk ASAP. You could use DBCC SHRINKFILE() to shrink it, but it will not shrink
You can easily connect to a MS Access database by using JDBC. First, you need to set up the data source for your MS Access database using the ODBCAdministrator. You
This example code extracts the content of a zip file (the name of the zip file is supplied in args[0]). First, open the zip file using ZipFile class, then loop
Applications that allow editing of large, structured documents such as code listings might often benefit from the ability to track positions in the document as it is edited. Typically, recording
Sometimes the provided Swing cursor types just don’t meet the needs of your application. In those cases, you may want to consider creating your own, completely customized cursor. To add
Sometimes you want to make sure that you will have only one object of a specific class in your application. There is a simple technique for doing this. This example
Sometimes come across a situation where you need to swap two variables. Below is the code that will let you swap two pointers. Say that p and q point to
We can execute any member function or any other execution before main() function by using: “#pragma startup”.Syntax: #pragma startup [priority]//without semicolon Example: #includeclass CL{public: //A constructor CL(){ cout ” The
The multiplication operation for integer numbers is implemented in the processor as repeated additions. The number of additions can be reduced by considering the representation in base 2 of the
Binding a DataGrid – or any other data-aware control – to a DataSet or a DataTable at runtime isn’t difficult: you just have to assign the DataTable to the DataGrid’s
As you might have noticed, the Add Reference dialog in Visual Studio displays all the assemblies in the GAC, which brings up the following question: is there a way to
It often happens that you need to swap the operands of an assignment. For example, say that you have this set of assignments: p1.FirstName = m_FirstNamep1.LastName = m_LastName and later
Thanks to Visual Studio.NET macros, it is quite simple to automate the task of transforming a Public field into a Property with the same name that accesses a private field
When you’re working with the Visual Studio .NET code editor, typing a Try keyword plus the Enter key automatically creates the End Try statement. The following simple macro does something
Nothing beats ILDASM when it’s time to understand what your VB.NET or C# compiler actually emits. In this case you should prepare a desktop shortcut to ILDASM so that you
Persisting an array of data in a SQL Server DB is usually considered quite difficult. The common solution is to use a master detail table, but this leads to a
‘ Download the HTML source code at the specified URL’ You can optionally specify the username/password credentials,’ in case the page uses Basic Authentication’ Returns a null string if any
emember the movie, ‘Who is Killing the Great Chefs of Europe?‘ This B-film was released in the late 70’s and its plot parallels the current trend in IT today. No,
The Process class provides all you need to create a command-line utility that lists all the processes running on the system and all the related information. This utility is therefore
The System.Diagnostics.Process class exposes two methods that let you kill a process: CloseMainWindow should be used with processes that have a graphical interface, whereas the Kill method should be used
You can use the VB.NET Shell command (in the Microsoft.VisualBasic namespace) to run an external process and wait for its termination, but you can get better control if you work
Enum FormatMemorySizeUnits BestGuess Bytes Kilobytes Megabytes GigabytesEnd Enum’ convert a number of bytes into Kbytes, Megabytes, or GigabytesFunction FormatMemorySize(ByVal value As Long, _ ByVal unit As FormatMemorySizeUnits, Optional ByVal decimalDigits
Enum FormatColumnAlignment Left Center RightEnd Enum’ format a value in a column of given width and with specified alignment’ using the specified pad character Function FormatValue(ByVal value As String, ByVal
t first glance, bringing peer-to-peer capabilities to mobile wireless devices may appear to impose a needless layer of complexity on the already complex task of providing remote access. This concept
SQL Server experts know that the DB engine never accesses directly the data pages on disk; rather it uses a special module called “Cache Manager”. It is possible, by using











