devxlogo

We are an award-winning tech entrepreneurship website where trusted experts can provide value globally.

Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.

devxlogo

Trusted for 26 years

Over 30K Articles

1M+ Readers

Expert-reviewed

10K+ Tech Terms

As seen in:

microsoft logo
business_insider_logo
wired_logo
berkley
arstechnica_logo
hackernoon

The Latest

Avoiding Dependencies #1

Many C++ programmers will be familiar with the tidal wave of recompilations that occur when a seemingly unrelated header file is changed. C++ file dependencies need to be managed otherwise

Finding Last Day of the Month IN SQL Server

Certain applications require business logic to determine the last day of the month. This is the case for accounting applications that perform such tasks as invoice processing and customer billing.

Send Requests Via Stored Procedures

Whenever a client application needs to send Transact-SQL to SQL Server, send it in the form of a stored procedure instead of a script or dynamic Transact-SQL. This not only

Watch Out For Orphan SQL Server Connections

Orphan SQL Server connections can decrease SQL Server performance. An orphan connection occurs when SQL Server keeps the connection open, even though it is not being used. There are two

Run a VB Application During Start-up

Depending on the version of Windows targeted, there are two different ways to run a VB application during the boot process.Under Windows 9x systems, place a Shell command in the

CheckWindowsUser – Validate a username/password pair

Private Declare Function LogonUser Lib “Advapi32” Alias “LogonUserA” (ByVal _ lpszUserName As String, ByVal lpszDomain As String, _ ByVal lpszPassword As String, ByVal dwLogonType As Long, _ ByVal dwLogonProvider As

“Setter” and “Getter” Member Functions

Encapsulation is a fundamental principle in object orientation. Encapsulation restricts direct access to a data member of a class. Instead, users query the object itself in order to get or

Streams and Pointers

Look at the following program. It compiles correctly under every standard-conforming compiler. At first, this may seem surprising because seemingly, because it’s impossible delete an object which is not a

auto_ptr and Derived Objects

The auto_ptr class template respects polymorphism and destroys derived objects of base pointers properly. In the following program, an auto_ptr is actually bound to a B * pointer, where B

Qualified Calls

A function call such as the following: classname::funcname(); is a qualified call. Qualified disambiguate function names. They are needed, for instance, in a class that inherits from several base classes,

Accessing Static Class Members

Because static class members are not associated with a particular object of their class, you can access them even if you haven’t instantiated any object. In the following example, the

Emitting a Beep

The escape sequence ‘a’ is the ASCII code for a beep. To emit a beep from your program, output this escape sequence to the standard output. For example: const char

Copy Constructor’s Signatures

C++ defines four possible forms for a class’s copy constructor. For a class called X, a copy constructor can have one of the following forms: X(X&);X(const X&);X(volatile X&);X(const volatile X&);

Constructor Names

Technically speaking, constructors have no name. This may seem strange at first because you define a constructor for class X as X::X(). However, this construct is not the name of

Returning a Value from a Function that Throws

A reader asked me the following questions: “Can a function that returns something, throw a exception and still return a value?” Lets’ look at a concrete example: int f(){ if

The AutoText class module

This class can help in simplifying most of the validation chores in your UI-intensive apps. The class “wraps” around a TextBox control and traps most of its events, to automatically

Security for the global Internet

Introduction In this article I’ll move away from COM security to provide an overview about that vast subject generally referred as “Internet security”. As you will see, providing an effective

TransposeMatrix – Rotate a bi-dimensional array

‘ evaluate the transposed matrix” a transposed matrix is the array you get when’ you “rotate” a bi-dimensional arrayFunction TransposeMatrix(arr() As Double) As Double() Dim startRow As Long, startCol As

Crc16 – Evaluate the 16-bit CRC of an array of bytes

Option Explicit’ Evalutate the 16-bit CRC (Cyclic Redundancy Checksum) of an array of bytes” If you omit the second argument, the entire array is consideredFunction Crc16(cp() As Byte, Optional ByVal

Measuring Small Increments of Time in VB

In Visual Basic, it is not possible to measure time with more precision than one second. This code allows the user to measure time passed in increments less than one