Latest String Algorithms Articles

URI Encoding and Decoding

Learn about fast and portable URI encoding and decoding functions that use std::string as the argument and return type, and do the buffer conversion, including '\0'.

Flex Your Lexical Analysis Muscles

The Flex lexical analyzer generator enables you to accurately act on and react to incoming character data streams in a way that is both predictable and debuggable.

Receiving & Converting Numeric and String Data via Sockets

Many times a remote system will send a numeric value indicating the length of the data to be received in subsequent receive commands. However, when you start sending and receiving numeric data via sockets, you have to be aware of conversion issues in terms of what type of machine is on the other end of the connection.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

The Sorry State of .NET ORMs

Looking to work with a non Microsoft Database in .NET? You need to know what ORM's are available, and why you can't currently use Entity Framework.

Top White Papers and Webcasts

  • Java developers know that testing code changes can be a huge pain, and waiting for an application to redeploy after a code fix can take an eternity. Wouldn't it be great if you could see your code changes immediately, fine-tune, debug, explore and deploy code without waiting for ages? In this white paper, find out how that's possible with a Java plugin that drastically changes the way you develop, test and run Java applications. Discover the advantages of this plugin, and the changes you can expect to see …

  • A majority of organizations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute. With many high profile breaches in 2013 occurring on endpoints, interest in improving endpoint security is top-of-mind for many information security professionals. The full results of the inaugural SANS Endpoint Security Survey are summarized in this white paper to help information security professionals track trends in endpoint …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds