(David Catherman) Visual Studio 2005 offers fantastic improvements in rapidly constructing Windows and Smart Client applications. The Data Sources panel automates placing controls on a form and binding them through the Binding Source component. While the Binding Navigator component offers great pote
Other News
Putting REST on Rails
(Dan Kubb) “Convention over configuration” is one of the key principles behind the design of Ruby on Rails. It was built with a specific way of doing things and as long as you follow the “Rails way” everything will just work with little or no configuration. That’s part of the reason Rails is so succ
Encryption/Decryption using RSA, DES, 3DES and Rijindael in VS.Net 2005
(Sonu Chauhan) This article will give the detailed picture of Encryption/Decryption in .NET. Cryptography is a way to encrypt and decrypt data. By encrypting data you are protecting your data from other curious users who would like to know the data that is present.
TRY…CATCH in SQL Server 2005
(Scott Mitchell) SQL Server 2005 offers a number of new features over its predecessor, including many features aimed at making working with databases more like writing .NET application code. For example, in SQL Server 2005, stored procedures, triggers, UDFs, and so on can be written using any .NET F
Taking a Look at MySQL 4.1
(Jon Stephens and Chad Russell) Many of you are still working with earlier versions of the MySQL database. This article takes a look at MySQL 4.1. It is the first of several parts that examine more recent versions of the software.
Driving up software quality: the role of the tester
(Helen Joyce) The natural instinct of a software developer is to demonstrate that their application works. They are genuine problem-solvers, sharp and go-getting, who can knock out a prototype application in a matter of weeks or even days. A tester’s focus is different. It is to demonstrate an appli
Security expert calls for Oracle makeover
(Martin Veitch) A UK security expert has called for change in Oracle’s security strategy, including the removal of the firm’s chief security officer.
Thinking XML: Review of RFC 3470: Guidelines for the use of XML
(Uche Ogbuji) In the last Thinking XML installment “Good advice for creating XML,” I discussed a couple of resources provided by experts looking to advise XML developers. XML was designed specifically for use on the Internet (the Web to be precise), and many Internet protocols use XML to represent d
Code Access Security: When Role-based Security Isn’t Enough
(Robert Bogue) Ask any typical .NET developer about Code Access Security (CAS) and you’ve got the chance of hearing “Huh?” as the response. Most developers haven’t run into CAS at all—let alone in a way that would cause them to develop a deep understanding of it.
An End-to-End solution Using WebSphere Business Integration V6.0 Products
(Xiong Fei Pan and Ming Hua Qin) This article series demonstrates how to use IBM WebSphere Business Integration V6.0 products to model, assemble, deploy, and manage a business process in an end-to-end solution using WebSphere Business Modeler, WebSphere Integration Developer, WebSphere Process Serve
