Peter Sollich shows how CLR Profiler, a tool focused on analyzing the allocation behavior of managed applications, lets you find out which objects live longer due to finalization, and how the behavior of the application changes when you call the Dispose() method.
Tag: Development
Bad Data and Buggy Code: Using Java’s Exceptions and Debugging Features (Sample Chapter)
(Cay Horstmann and Gary Cornell) In a perfect world, users would never enter data in the wrong form, files they choose to open would always exist, and code would never have bugs. Alas, we don’t live in this perfect world. This chapter introduces the concepts of debugging and exception handling for w
Advanced Tree Control
(Alex Zakharenko) This article presents an advanced control based the on standard tree view control. This control supports multiple selection modes and some visual enhancement compared to the original control. It also explains some implementation details and may be useful to anyone who needs to fine
High Availability: It’s More Affordable Than Ever
One serious unplanned downtime event. That’s all it takes for most companies to pay for a high availability solution. But until a few years ago, only the largest companies could afford this remarkable business-continuity technology. Times have changed. Download this informative white paper and l
Writing Provider-Independent Data Access Code with ADO.NET 2.0
(Alex Homer) The data access features in .NET changed the way developers write code by segregating the data providers into separate classes and namespaces, depending on the type of database that was being targeted. For example, to access SQL Server, Microsoft encourages you to use the classes from t
Special Report: Database Security
(Fred Cohen) Databases control most of the business world’s valuable information. Pick a vital application–credit-card processing, EDI, financial analysis, just-in-time production–and you’ll find a database under it.
Sending E-Mail from Your PHP Applications
(W. Jason Gilmore) Communicating with Web site users via e-mail is crucial to the success of any online service. The ability to deliver registration confirmations and newsletters; provide a convenient and relatively secure password recovery tool; and keep clients updated with shipping status reports
Code Access Security with Microsoft .NET Framework
(Mark Strawmyer) This installment of .NET Nuts & Bolts is part one of a two-part series exploring code access security and how it is controlled by the Microsoft .NET Framework. The Microsoft .NET Framework includes a number of security features that assist you in developing secure applications. The
Ensure data integrity with validation
(Tony Patton) This data is often stored in a backend database system, which contains data constraints defining what is and is not allowed, so the data collected and sent to the database system must adhere to the constraints to avoid errors.
Microsoft’s Indigo takes on Java
(Martin LaMonica) Microsoft wants Windows to play well with others. To do that, it’s recoating the future in Indigo. (R)