(Jani Järvinen) In this article, it’s my pleasure to introduce you to the best of the classes and methods that the System.Diagnostics namespace has to offer for developers using the .NET Framework version 1.1. At the same time, I’ll share my tips and hints on how to diagnose your .NET applicatio
Tag: Development
Handling Strings and Arrays
(Steven Holzner) In PHP, two types of data (strings and arrays) warrant special attention and a more complete explanation. This chapter details how and why these special data types are employed in PHP 5 with copious examples to get you started using these in your code.
SQL Classes Encapsulation (simplified stored procedure calls, queries and DataSet Returns with .NET)
(Xodiak) So you have an application that has a SQL server backend. And now you have to deal with all the different SQL connection classes like SqlConnection, and SqlDataAdapter, and DataSet and SqlCommand. And then manage all these classes to work together so you can return a DataSet or run some Q
Generic Methods in Visual Studio 2005
(Paul Kimmel) Some things are good in their own time. Bell bottoms were deemed to be good in the 1970s, but today, after a short revival, they are considered goofy. In contrast, blue jeans have always been deemed to be good, whether you choose Wranglers or Levi’s. The same thing is true of code idio
Full-text searching with IFilter’s
(Klaus Salchner) The nineties were all about information creation and sharing. Today’s challenge is about finding the information you need when you need it. We all feel the ongoing pain that we never can find that piece of information which helps us to do the tasks at hand. The result being that we
How to Maintain a Code Group in Security Policy at Runtime
(subbuvr) Whenever protected resources are accessed by an assembly, the permissions are determined by the code access security system of CLR. Each permission set granted to an assembly is based on the assembly’s evidence (such as its URL or publisher certificate, strong name), which in turn is based
Five-Step UML: OOAD for Short Attention Spans – Define, Refine, Assign (Sample Chapter)
(Martin L. Shoemaker) In this chapter, I’ll introduce you to Five-Step UML. We’ll work through the whole process from beginning to end, and along the way, I’ll be introducing all the UML notation that you’ll need to understand the relevant diagrams. I’ll also show you how the whole thing works from
The Practicality of OO PHP
(David Day) There seems to be a common pitfall among some PHP developers–especially those just beginning PHP programming–and that is their lack of object-oriented (OO) PHP use. This article’s purpose is to inform developers about the practicality of OO PHP; fully understanding the benefits of usin
Maintaining Database Consistency with Transactions
(Scott Mitchell) While databases can efficiently hold large amounts of information that can be queried, all that data and all that querying power is useless if the data is incorrect or nonsensical. Databases provide a plethora of techniques for ensuring the integrity and consistency: primary key and
Cryptography and .NET – Part 4 (Hash Values)
(Bipin Joshi) In previous parts of this series (Part 1, Part 2 and Part 3) we saw various techniques of encrypting the data. In this part we are going to learn how to ensure that data coming to you has not been tampered with during the transfer. The technique that we will be using is hash. Hash valu