ATL Coding Helpers

Here I put a collection of helper and workaround classes/macros I developed through my experience with ATL and popularized at our site. I guess it might be useful to others.

I don't pretend to be original or smartest and apologize if similar ideas or code were already appeared anywhere.

What's included:

  • Yet another smart pointer class that frees your from using IID_*.
  • Seamless error handling, no more tiresome branches over right screen side!
  • Easy dynamic creation of ATL-based objects, allows to overcome an unavailability of default constructor like in case p = new CComObject<CMyClass>.
  • Windows.x message crackers at CWindowImpl msg map.
  • Simple and efficient way to build multiple dispinterface event sinks at single object.
  • CComEnum enhanced with bug fixed.
  • Automatic handling of critical section lock.
  • Many other useful helpers.

The up-to-date version could be downloaded at:
http://www.geocities.com/SiliconValley/Peaks/6327/AtlAux.zip



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: September 10, 2014 Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds