(Martin Zahn) ADO.NET supports many ways to manage memory-resident data returned in a DataSet. In this article you will see that ADO.NET exposes addidional functionality to the ways you can sort and filter data.
Tag: Development
Application Security Becomes a Priority
(Chris Wysopal) Gone are the days when security breaches could be pushed aside and dealt with behind closed doors. Information security breaches are now front-page news. While it is unclear how many security breaches can be blamed on insecure technology, the incidents point to potential gaps in appl
Wed Yourself to UML with the Power of Associations, Part 2
(Anneke Kleppe and Jos Warmer) In the first article in this series, we explained the concept of associations in UML and showed how to implement them. This article takes that knowledge one step further and explains the UML association class and its implementation. The implementation examples are agai
The .NET Show: Management Services
In this episode Alex Sutton and Marty Hough show us the improvements to the system and application event logging model that will make it easier for applications to expose details about their operational processes.
Mine Your Own Data with the JDM API
(Frank Sommers) The Java Data Mining API (JDM) is the first attempt to create a standard Java API to access data-mining tools from Java applications. JDM promises to bring to data mining what JDBC brought to databases, and to make data mining a new and useful part of an enterprise Java developer’s t
eXtreme .NET: Practice Your XP with a Fictional Case Study
(Neil Roodyn) In my book, "eXtreme .NET," I introduce a team of developers who are learning how to improve their ability to deliver great software. In this article, you’ll follow this team as they learn about a new tool to help them develop software solutions using the .NET Framework. The tool they
Exploring Security in .NET: Part I
(Razi bin Rais) Before exploring the security features of .net several questions come to mind , lets take a look at some of these questions What evidence do we have to ensure its trustworthiness? How can we be sure that this code is trusted? When we request a module , how do we know if the
A Close Look at wxPython Controls
(Peyton McCullough) Controls are, obviously, essential to your wxPython applications. They allow you to gather input from the user so that you can make decisions based on that input. Let’s take a close look at a few controls availible to you and your applications. This article will cover wxChoice, w
Establish common ASP.NET page features through inheritance
(Tony Patton) One of the hallmark features of object-oriented development is inheritance. It allows you to utilize features from one object in another. For example, inheritance plays a vital role when creating new custom controls in .NET (the Control class is the base class). In addition, you can ta
Saving PHP’s Session data to a database
(Tony Marston) As you should be aware the HTTP protocol, as used for serving web pages, is completely stateless. This means that after the server has received a request, processed it and sent a response, the process which dealt with that request dies. Anything that the process had in its memory ther