ATL Coding Helpers

Here I put a collection of helper and workaround classes/macros I developed through my experience with ATL and popularized at our site. I guess it might be useful to others.

I don't pretend to be original or smartest and apologize if similar ideas or code were already appeared anywhere.

What's included:

  • Yet another smart pointer class that frees your from using IID_*.
  • Seamless error handling, no more tiresome branches over right screen side!
  • Easy dynamic creation of ATL-based objects, allows to overcome an unavailability of default constructor like in case p = new CComObject<CMyClass>.
  • Windows.x message crackers at CWindowImpl msg map.
  • Simple and efficient way to build multiple dispinterface event sinks at single object.
  • CComEnum enhanced with bug fixed.
  • Automatic handling of critical section lock.
  • Many other useful helpers.

The up-to-date version could be downloaded at:
http://www.geocities.com/SiliconValley/Peaks/6327/AtlAux.zip



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: June 23, 2015 Business transformation is not just important, it is vital to the success of all organizations in the 21st century marketplace. How IT approaches and executes the move from cost center to revenue contributor will not only transform the IT organization, it will change how companies retain competitive advantage and meet the requirements of internal and external customers. This shift in thinking is not new, but actualizing it is. Check out this eSeminar to learn the …

  • Do you spend a lot of time thinking about your enemies? Attacker attribution - figuring out who's out to get you - is one of the most important things an organization can do to protect itself.  Because you have no hope of defending yourself if you don't understand who the attackers are. Good news? Every organization isn't targeted by all the attackers. Bad news? No one can identify your potential attackers as well as you. Read this graphics-rich threat summary for 2014 to determine who might be your next …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date