
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
In order to assist continuous and effective monitoring of lock status, SQL Server offers the system stored procedure SP_LOCK, which can provide several useful pieces of information on how locks
Restoring a corrupted master database is one of the most difficult tasks you may have to deal with. If this catastrophic event happens, here’s how to proceed. First, you need
Editor’s note: This is the third and final part of a series about how to build your own XML editor. f you’ve been looking for a cross-platform, open-source, XML editor,
s I’ve shown in my previous 10-Minute Solution, “Choosing the Right Backup in SQL Server,” SQL Server provides you with numerous ways to back up your database, allowing you to
uring my years as a database developer I have often faced the task of finding and deleting duplicate data in a database. Duplicates impact data accuracy and credibility, and they
f you look at it from one perspective, the Java programming language at age six is only in first grade. On the other hand, Java’s significant strengths and large base
The common way of calling a function through a pointer is using the pointer as if it were a function. In other words, if p is a pointer to a
You can define a member function that is a template in a non-template class. For example: class A{public: template void func(); // member template }; How can you call such
A generator is a function or algorithm returning a series of values upon successive calls. The most common example is a random number generator although generators have many other useful
The standard iostream family of classes defines the widen() member function which converts a single char to its wide-character equivalent. widen() has the following prototype: char_type widen(char c) const; The
In a previous tip, I showed how to convert a string containing a hexadecimal to int using the sscanf() function. stringstream objects can perform this feat too, in a more
In addition to the widen() member function, the iostream framework supports the narrow() member function which performs the reverse operation, i.e., converting a wide character to its corresponding char value.
Conceptually, destructors of global objects are called after main() has exited. For this reason, many debugging and memory checking tools are confused and report phantom memory leaks or warn about
Unlike C-strings, a std::string object may contain null characters in the middle of its internal buffer. For example: std::string s=
Consider the following example: class A : public list < A >{ // …}; Does your compiler accept it? According to the Standard, using an incomplete type as a template
To execute a UNIX shell script, first the shell needs to be executed. This can be done using an object of java runtime class. rtime = Runtime.getRuntime();Process child = rtime.exec(
Public methods and member variables of Java applets are visible to HTML documents. This makes the methods and variables can be accessed using JavaScript. The syntax for doing this is
The file Java/Javalog.txt in the Windows directory (i.e. C:windowsJava.Javalog.txt for windows and C:winntJavaJavalog.txt for NT) contains information for the last applet that was loaded by Internet Explorer. This file contains
Class javax.servlet.http.cookies can be used to access cookies on the client side. The following code demonstrates this technique. The code also checks for the cookie names in order to access
In this article, I will make a few guesses of how you canchange your coding style and prepare yourself already today for the transition,to make it as smooth as possible.
Private Declare Function SendMessageLong Lib “user32” Alias “SendMessageA” _ (ByVal hwnd As Long, ByVal Msg As Long, ByVal wParam As Long, _ ByVal lParam As Long) As LongPrivate Const WM_SETREDRAW
Private Declare Function SendMessage Lib “user32” Alias “SendMessageA” (ByVal _ hwnd As Long, ByVal wMsg As Long, ByVal wParam As Long, _ lParam As Any) As LongConst LVM_FIRST = &H1000Const
Private Declare Function SendMessage Lib “user32” Alias “SendMessageA” (ByVal _ hwnd As Long, ByVal wMsg As Long, ByVal wParam As Long, _ lParam As Any) As LongConst LVM_FIRST = &H1000Const
‘ Convert a Word-compatible format to an other format.’ Parameters:’ – sFileName is the file to convert’ – wdFormat is the destination file’s format’ – sNewFileName is the destination file.
Private Declare Function SendMessage Lib “user32” Alias “SendMessageA” (ByVal _ hwnd As Long, ByVal wMsg As Long, ByVal wParam As Long, _ lParam As Any) As LongPrivate Type RECT Left
This routine uses all the good stuff that FileSystemObject offers. Here it is: Public Sub DeleteFiles(ByVal strPath As String, ByVal strExtension As String) Dim fsoMain As Scripting.FileSystemObject Dim folToDeleteFrom As
It’s easy to introduce duplicate rows of data into Oracle tables by running a data load twice without the primary key or unique indexes created or enabled.Here’s how you remove
Most ADO statements require special constants to be passed as arguments to method calls, as in: rs.Open “Authors”, cn, adOpenForwardOnly, adLockReadOnly, adCmdTable The above line is surely more readable than:
1) To convert a string into an integer: public class StringInt{ public static void main(String[] args) { String stringValue =











