
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
Private Declare Function GetWindowText Lib “user32” Alias “GetWindowTextA” _ (ByVal hwnd As Long, ByVal lpString As String, ByVal cch As Long) As LongPrivate Declare Function GetClassName Lib “user32” Alias “GetClassNameA”
Option ExplicitPrivate Declare Function GetStdHandle Lib “kernel32” (ByVal nStdHandle As Long) _ As LongPrivate Declare Function WriteFile Lib “kernel32” (ByVal hFile As Long, _ lpBuffer As Any, ByVal nNumberOfBytesToWrite As
Private Declare Function GetStdHandle Lib “kernel32” (ByVal nStdHandle As Long) _ As LongPrivate Declare Function ReadFile Lib “kernel32” (ByVal hFile As Long, _ lpBuffer As Any, ByVal nNumberOfBytesToRead As Long,
Private Declare Function GetClassName Lib “user32” Alias “GetClassNameA” (ByVal _ hwnd As Long, ByVal lpClassName As String, ByVal nMaxCount As Long) As Long’ Return the class name of the specified
y capitalizing on Internet Explorer’s ability to embed XML data islands in Web pages you can create customized data-display pages with just a few lines of JavaScriptIn today’s IT world,
IIS5 enables buffering by default, therefore all the output from your ASP is actually sent to the browser only when the page completes its processing. In many cases this approach
This knob control lets the user select a numerical value by rotating it. Itworks like a scrollbar: just set the Min/Max properties and read the Valueproperty in the Scroll event.
It is especially important to correctly set Windows NT4’s Server service in “Application Server” mode to ensure that the Server service doesn’t absorb all the available hardware resources while providing
The indexing schema plays a fundamental role in performance tuning, and tools such as the Index Tuning Wizard that can suggest efficient schemas on the grounds of a database usage.
At times a database appears to be marked as “suspect” in the Enterprise Manager. SQL Server marks a database as suspect with it can’t access the database. What happens at
Using the sp_user_counterX stored procedure (where X is a number between 1 and 10) you can set internal SQL Server counters. This values are read by the Performance Monitor, the
This article explains how you can create a Microsoft Word document from T-SQL and fax it through a method exposed by its Automation object model. You can create and destroy
You can reuse resources from other connections by resorting to two little known SQL Server’s stored procedures, which allow several connections to share the same transactional space: sp_bindsession and sp_getbindtoken.
This control does one thing, but does it well. It centers a picture on an MDI forms Client area. Windows Meta Files (WMF) can be transparent. Just place the control
The MSDE database engine is 100% compatible with SQL Server and subject to the same license policy of the Jet engine. One of the fundamental differences between MSDE and SQL
SQL Server provides several security levels, and the control that the system administrators can pursue over the DB’s objects is extremely accurate. It’s often useful to know which rights each
One of the neatest features in SQL Server 7 and later versions is the capability to query external data sources through their OLE DB providers, in other words behaving exactly
If you haven’t localized SQL Server for your language, the default date format is the American one: DD/MM/YY. You may need to display a date in different formats, and you
In order to assist continuous and effective monitoring of lock status, SQL Server offers the system stored procedure SP_LOCK, which can provide several useful pieces of information on how locks
Restoring a corrupted master database is one of the most difficult tasks you may have to deal with. If this catastrophic event happens, here’s how to proceed. First, you need
Editor’s note: This is the third and final part of a series about how to build your own XML editor. f you’ve been looking for a cross-platform, open-source, XML editor,
s I’ve shown in my previous 10-Minute Solution, “Choosing the Right Backup in SQL Server,” SQL Server provides you with numerous ways to back up your database, allowing you to
uring my years as a database developer I have often faced the task of finding and deleting duplicate data in a database. Duplicates impact data accuracy and credibility, and they
f you look at it from one perspective, the Java programming language at age six is only in first grade. On the other hand, Java’s significant strengths and large base
The common way of calling a function through a pointer is using the pointer as if it were a function. In other words, if p is a pointer to a
You can define a member function that is a template in a non-template class. For example: class A{public: template void func(); // member template }; How can you call such
A generator is a function or algorithm returning a series of values upon successive calls. The most common example is a random number generator although generators have many other useful
The standard iostream family of classes defines the widen() member function which converts a single char to its wide-character equivalent. widen() has the following prototype: char_type widen(char c) const; The
In a previous tip, I showed how to convert a string containing a hexadecimal to int using the sscanf() function. stringstream objects can perform this feat too, in a more
In addition to the widen() member function, the iostream framework supports the narrow() member function which performs the reverse operation, i.e., converting a wide character to its corresponding char value.











