(PadexArt) The solution presented in this paper is a simple one, yet I’ve spent a few days looking for it, and then building and improving it. I’m sure this solution it is not new and that it can be improved, so please contribute your comments to it.
Tag: Development
A Mobile Utility in VB.Net
(G. Varadharaj) The rapid advancement in cellular communication and digital technology has resulted in newer models of cell phones, with the latest technologies, being introduced almost every other day. The competitive marketing strategies of the cell phone manufactures have brought down the cost of
Performance-Tuning Data Models
(Walter Howard) If you’ve made it alive through the technology downturn over the past few years, chances are you’ve had to do more for less. One of the things I’ve found myself doing more often than before is performance tuning my physical data models instead of handing them off to a DBA team for ph
More Object Orientation in Python
(Peyton McCullough) This article goes beyond the basics of object orientation in Python. It covers the interesting things you can do with new-style classes, including properties and attributes, as well as other useful information.
Secure programmer: countering buffer overflows
(David Wheeler) This article discusses the top vulnerability in Linux/UNIX systems: buffer overflows. This article first explains what buffer overflows are and why they’re both so common and so dangerous. It then discusses the new Linux and UNIX methods for broadly countering them—and why these
The TransactionScope Object Makes ADO.NET Transactions Easy
(Paul Kimmel) In database development, the concept of consistency dictates that the database is always in a valid state. Transactions exist to support consistency. The transaction is a mechanism by which you can treat multiple operations as an all-or-nothing whole: All the pieces work and all the ch
Data solutions for disconnected applications
(Steve Joubert) “Smart client” is more than a fancy moniker for Win Forms, or a marketing ploy to sell Visual Studio 2005. It is an architecture that allows Win Forms applications to function when they are disconnected from the network and their primary data source.
Create a complete authentication system with Visual Basic 2005 (Sample Chapter)
(Jesse Liberty) With the ready-to-go controls and built-in functions found in Visual Basic 2005, creating the system is much easier than it used to be. This sample chapter from Programming Visual Basic 2005 explains how to use forms-based security and Visual Basic 2005 to create a complete authe
Cryptography in .NET
(N.Paramaguru) Cryptography is the science of analyzing and deciphering codes and ciphers and cryptograms. The usage of cryptography is critical nowadays, since lot of confidential data is being transferred through highly insecure mediums. Though the mediums claim to be much secured, there are poss
Edit and Continue in ASP.NET
(srirambalaji) If you are into developing large Web applications, the following situations may sound familiar: –Build the VS.NET solution. That will take a long time to build. –You start debugging your application. You realize you made a small mistake.