(David Catherman) In Part 1 and 2 of this series, we looked at using the Rapid Application Development (RAD) tools in Visual Studio to develop 3-tiered applications with a strong emphasis on Object Oriented Programming (OOP). By building Typed DataSet objects in a separate Business project and the O
Tag: Development
Learn about the next generation of .NET certification
(Tony Patton) Certification was all the rage when I first embarked on a career in the IT field more than 10 years ago. Employers and clients clamored for the magic paper certificates to verify skills. In those days, the term “paper certification” was used widely to describe an IT pro who had attaine
Global Information Framework and Knowledge Management, Part 3
(Paul Prueitt) Informational convolution is defined to be a process that visits each element in a hash table and performs some logic using a small rule engine and the contents of the hashed element and associated bucket. Our work is a generalization of patents and partially owes its origin to a cont
Sloppy Leftovers from Yukon Betas; Package ‘Visual Studio Common IDE Package’ failed to load
(Larry Chesnut) No, I’m not talking about Thanksgiving leftovers … that comes later this week. Today, I’m talking about those of us who always have to download the latest version of SQL Server 2005. By living on the bleeding edge, we eventually get cut in one way or another. Mine happened to be with
Use Best Practices for Keeping Your SOX in Compliance
(Niel Robertson) Sometimes bad things happen to good people. For many developers, that is the perfect summation of how the Sarbanes-Oxley (SOX) Act has affected their daily lives. At first blush, the SOX Act looks like yet another set of checks and balances to ensure accurate financial reporting
Nine principles of security architecture
(Bruce Byfield) Security architecture is a new concept to many computer users. Users are aware of security threats such as viruses, worms, spyware, and other malware. They have heard of, and most use, anti-virus programs and firewalls. Many use intrusion detection. Architectural security, though, re
Creating a Searchable Inventory System: Retrieving and Managing Search Results
(Brian Vaughn) In this third article in our series, we will look at the type of functions for which we need to use our search information, then take a look at retrieving records based on various search criteria.
Level 3 and 4 disasters: Data loss and critical system failures
(Mike Talon) In previous columns, I laid out a classification system for the most common types of disaster recovery (DR) situations, and last time I focused primarily on what to do when there is proof of a network intruder. Now let’s deal with what happens in more traditional DR situations: –Lev
Extending Formal Traceability Across The Lifecycle
UML (Unified Modeling Language) has emerged as the dominating industry standard graphical language for analyzing and describing software. This paper focuses on the significant project benefits that can be derived from tight integration between UML modeling and Requirements Management. (R, pdf)
ADO.NET 101: Data Rendering with a Repeater Control Introduction
(Jayaram Krishnaswamy) This tutorial series describes displaying the data from a DataReader using Iterative data bound controls. This particular article covers displaying data using the data bound control Repeater, which allows a certain degree of flexibility for formatting.