Latest General Articles - Page 3

Clone Smart Pointer (clone_ptr)

Learn about a non-sharing smart pointer class that can be used with STL containers such as std::map, vector, list, set, and deque. The smart pointer has an assignment operator and greater than operator that call the target object's operator.

Delaunay Triangles

Learn about an algorithm to calculate this intriguing and important data structure in computer graphics.

Selecting a Geometrical Object

Learn about a method of selecting a geometrical object which is described by its vertices. This article might be of use if you are creating 2D or 3D shape related software.

Message Digests and Digital Fingerprints

Learn about an OO implementation of the MD5 algorithm in C++. It does not simply copy Ron Rivest's C code into a class. It was written to help provide a better understanding of MD5 and how C++ and its STL may be used to implement it. The code is not optimised.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • Live Event Date: December 11, 2014 @ 1:00 p.m. ET / 10:00 a.m. PT Market pressures to move more quickly and develop innovative applications are forcing organizations to rethink how they develop and release applications. The combination of public clouds and physical back-end infrastructures are a means to get applications out faster. However, these hybrid solutions complicate DevOps adoption, with application delivery pipelines that span across complex hybrid cloud and non-cloud environments. Check out this …

  • Some of the statistics about the growth of enterprise mobility are surprising, not the least of which is the 4X increase in mobile malware from 2013 to 2014. Many employees today not only expect to be able to use their own personal devices at work, but will even contravene policies that restrict personal device use for work.  IT must find the right approach that balances the benefits of mobility with the risks involved.  This on-demand webcast offers steps toward developing a winning mobile strategy, and …

Most Popular Programming Stories

More for Developers

RSS Feeds