devxlogo

We are an award-winning tech entrepreneurship website where trusted experts can provide value globally.

Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.

devxlogo

Trusted for 26 years

Over 30K Articles

1M+ Readers

Expert-reviewed

10K+ Tech Terms

As seen in:

microsoft logo
business_insider_logo
wired_logo
berkley
arstechnica_logo
hackernoon

The Latest

Understanding IIS Isolation Levels

Internet Information Server introduced the notion “Isolation Level”, which is also present in IIS4 under a different name. IIS5 supports three isolation levels, that you can set from the Home

Using Precompiled Headers

Many compilers have a special switch for precompiled headers. A precompiled header is a binary file containing intermediate code that is the result of preprocessing and compiling an ordinary header

Comma Separated Expressions in Function Calls

Can you tell the difference between the following function calls? f(a,b);g((a,b)); // how many arguments are being passed to g? In the first example, the function f() is called with

What is a NaN?

Due to hardware limitations and the finite nature of computer arithmetic, certain numeric values cannot be represented properly. These values include infinity, negative infinity, and so on. The limits of

Retrieving Drive Names

To retrieve drive names from a system, use the static method listRoots in java.io.File package. It will return the all-available drive present in the system. This method will be useful

Using Addbatch and Executebatch

If you insert/update/delete multiple times to the database, you canimprove performance by using the addbatch and executebatch methods of statement objects. One drawback about using this method is that it

How to Compact Databases Using ADO

To compact MDB databases using ADO, just include a reference to the ‘Microsoft Jet and Replication Objects 2.6 Library’ (distributed with the MDAC 2.6 package) in your VB project. The

JTextfield For Digits Only

Subclass PlainDocument, then set the document of the JTextfield to the subclass as shown below: JTextField myJTextfield;myJTextfield.setDocument(new DigitsDocument());class DigitsDocument extends PlainDocument { public void insertString(int offs, String str, AttributeSet a)throws

A Fast Recordset Loop

Opening recordsets as ForwardOnly or ReadOnly makes them move faster between records. In addition, storing fields to variables before begining the loop speeds up field access. Example: * Create a

Confining Your Mouse to a Form

With Modal forms there is a need to restrict the movement of the mouse to the form until user closes the form. This can be achieved by using the ClipCursor

Problems With Using Duplicate Variables

Most beginners accidentally declare duplicate variables of different data types or of the same data types. The following illustrates this: class Duplicate{ String data; private void fun() { String data=

Outputting Results To An Excel Document

One drawback to presenting data to a browser is that once you have it you can’t manipulate it. With more and more business functions being carried out through the web

MTS Package and Deployment Add-In

This add-in helps you manage the MTS Administration from with in the VB 6.0 environment. No more having to compile your dll, then open MTS so that you can do

Implementing Secured Web Applications with IIS5

You may have read my previous articles on the VB2TheMax site where I described COM+ and the basics of Internetsecurity [1]. In the last article of this series I willdiscuss

GetFileIcon – Retrieve the icon associated to a file

Private Const MAX_PATH = 260Private Type SHFILEINFO hIcon As Long iIcon As Long dwAttributes As Long szDisplayName As String * MAX_PATH szTypeName As String * 80End TypePrivate Declare Function SHGetFileInfo

Create a GUID from ASP using SQL Server

At times you may need to create a GUID from ASP, for example when assigning unique IDs to users that are visiting your site for the first time. While you

Tame Beastly Data with Summary Tables

anagers loved Eddie; he always had the answers on-hand. Eddie was a production supervisor in the pre-computer era. He received comprehensive hourly production reports on paper. He also received urgent

Document Your XSLT

“Document Your Code! Document Your Code!!” This is one of those lessons hammered into most Computer Science majors about three days into their first code class–and one quickly forgotten by