Latest C++ Articles - Page 3

How to Make Fewer Errors at the Stage of Code Writing. Part N2

This is the second article on avoiding certain errors at the early stage of code writing. In the previous post, we have already advised you to avoid a large number of calculations in one expression. However, we should investigate this question in detail. Let's see what's dangerous about complex expressions and how we can avoid many logical errors.

90 Errors in Open-Source Projects

The materials collected in this article will be useful for authors of articles, books and blogs. Examples of errors can be used to demonstrate the advantages of different programming styles -- for instance, why you should not try to make your code shorter by writing long expressions.

A Time Zone API supplement

Microsoft has an extremely limited set of Time Zone functions. This API will allow the full use of Time Zones in your Windows App.

C++ 2011: nullptr

C++ used to lack a special value to indicate a null pointer, which led to some problems. The new standard introduces a new reserved word nullptr, to designate a constant rvalue that represents a null pointer. Read on to learn more.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Top White Papers and Webcasts

  • Rocket Mobile® for IBM i is an enterprise mobile application development and deployment platform for customers who rely on the IBM i system. Rocket Mobile for IBM i enables customers to leave proven applications in-place and rapidly repurpose them into new managed and secure mobile applications. Fast, easy creation of mobile, web, and hybrid mobile applications that deploy to any iOS, Android, or Windows mobile phone or tablet Built-in integration for seamless repurposing of existing IBM i applications …

  • It's obvious that organizations consider data encryption and obfuscation mainstays of sound data protection requirements. IANS conducted a survey of over 100 information security professionals to see how they are dealing with advanced attacks while moving into cloud and outsourced service models, where they may have little control over security. Read this research report to learn why applying a strategic security policy of encryption and key management across the enterprise could certainly bring many benefits, …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date