Tutorials & Articles
-
Automated database change management
by Darren Fuller, InnovartisDarren Fuller discusses the need for database change management and problems with current approaches, and examines an automated methodology, the requirements to implement such an approach and describes the benefits that can be realised.
-
Secrets of Great Architects
by Don Awalt Rick McUmberThis article presents techniques for applying levels of abstraction to IT solutions, which can allow architects to focus on a single aspect at a time, and compares this to other engineering disciplines.
-
Automated email dispatch
by Ian ElliotIan Elliot has a long-standing problem with email - finding the best way to send it from within a program. See if his latest method works for you.
-
Container classes
by Jon VoteIf you want to access raw HTML, you need a container class, and Jon Vote thinks his is much better than Microsoft’s
-
DB Ghost for SQL management
by Kay EwbankDB Ghost should be of interest to anyone involved in managing changes to SQL Server databases.
-
Extending FileSystemWatcher to ASP.NET
by Ian StephensonIf you want to extend use of the FileSystemWatcher class to ASP.NET applications, Ian Stephenson explains how to go about it.
-
Crystal Reports
by Kay EwbankHow does the new version of Crystal Reports stack up, now that it is under new ownership?
-
In support of weak encryption
by Ian ElliotWith all the fuss about making things even more secure, you might wonder why you would ever need weaker cryptographic methods.
-
Integrating XML
by Jesse LibertyHow to create, edit, read and integrate XML files into your programs, and implement data-driven programs using XML-defined commands.
-
High-level Best Practices in Software Configuration Management
by Laura Wingerd Christopher SeiwaldWhen deploying new SCM tools, implementers sometimes focus on perfecting fine-grained activities, while unwittingly carrying forward poor, large-scale practices from their previous jobs or tools.
-
Seven Pillars of Pretty Code
by Christopher SeiwaldSome techniques for formatting code so that readers can make inferences about a program's structure and flow from its physical shape.
-
The Hardware Design Challenge
by Shiv SikandImplementing software configuration management (SCM) practices in a hardware design environment is a complex task, but can offer a range of benefits.
-
Best practices for test-driven development using Nunit
by Edward GarsonDespite plenty of coverage of Test Driven Development (TDD), a largely ignored area is that of best practices. Here we introduce TDD and flesh out best practice scenarios using NUnit.
-
InstallShield X in review
by Mike JamesHow well does InstallShield X cope with the increasingly knotty problems of a multi-platform world?
-
Wired for sound
by Sing LiThere are lots of reasons for wanting to control your PC's sound hardware, but Sing Li just wants to sing-along with his favourite tracks.
-
The .NET FileSystemWatcher class
by Ian StephensonIf you’ve ever wanted to build code based on changes in the filesystem, then all you need in most cases is a good working knowledge of the .NET FileSystemWatcher class.
-
C# fundamentals
by Mike JamesAre you sure you know exactly how C# works? Mike James examines some fundamental ideas, and discovers that things are not always as they appear.
-
Secure applications development
by Peter VarholApplication security starts with the developer, but building secure applications isn’t easy.
-
New features in Java 1.5
by James WintersDeveloping in Java is becoming easier, thanks to an evolving philosophy at Sun and new features in Java 1.5
-
Road to recovery
by Gary ShortYou’ve just realised that you don’t know what your email password is. What do you do? Admit to the system administrator that a programmer is fallible? No, of course not – you write a program to recover it!