(Martin L. Shoemaker) This article continues our introduction to the concepts of Five-Step UML, working from beginning to end. It introduces UML notation and goes into great detail. This article covers the final two steps of a five-step process.
Tag: Development
Borland Delphi 2005 RAD for ADO.NET
(Bob Swart) This tutorial demonstrates the capabilities of the Delphi RAD for ADO.NET, including new Providers and Resolver model, DataHubs, DataSyncs, Remoting, heterogeneous dataset resolution, and remote heterogeneous dataset resolution.
Using ADO.NET 2.0 to get schema and metadata information
(Amirthalingam Prasanna) This article describes how to obtain different types of information from your SQL Server 2000 database using ADO.NET 2.0, part of Visual Studio.NET 2005 and Microsoft .NET 2.0.
Extend your .NET application with Excel
(Tony Patton) In a recent column, we explored the process of integrating Microsoft Word with the .NET Framework. There are numerous integration possibilities as the full power of the Microsoft Office Suite is available. In this article, we examine another scenario involving Microsoft Excel.
Design Recovery Issues and Opportunities in Extreme Programming
(K. Gauthaman, K. Mustafa and R. A. Khan) The authors examine the software-reengineering tasks and corresponding issues from the Design Recovery side. They also look at the possible solution offered by an existing software process called Extreme Programming (XP) and its practise.
An Introduction to UML and Classes
(Grady Booch, Ivar Jacobson and James Rumbaugh) Classes are the most important building block of any object-oriented system. A class is a description of a set of objects that share the same attributes, operations, relationships, and semantics. A class implements one or more interfaces. This chapter
Cryptography and .NET – Part 5 (Digital Signatures)
(Bipin Joshi) In the previous article of this series (Part 1, Part 2, Part 3, Part 4) we learnt to create hash values. Continuing our journey ahead we will cover Digital Signatures. Digital signatures are used to verify identity of the sender and ensure data integrity. They are often used along with
Dialogs in wxPython
(Peyton McCullough) You are probably already familiar with a few dialogs that can be used in your wxPython applications. Of course, wxPython contains many more dialogs, ranging in complexity from very simple to pretty advanced and covering a variety of topics, from text selection to color selection.
The Baker’s Dozen: 13 Productivity Tips for Building a .NET Distributed Application
(Kevin S. Goff) This installment of "The Baker’s Dozen" presents a Windows Forms database application that demonstrates some of the primary attributes of a distributed architecture. These attributes include authentication and connectivity, data management, business objects, user-interface modules, a
A Closer Look at ADO.NET: The Connection Object
(Michael Youssef) When developing database applications using .NET, the very first thing that we need is a connection to the database. ADO.NET provides us with connection classes like the SqlConnection class and OleDbConnection class. The SqlConnection class is part of the SQL Server .NET Data P