Latest Miscellaneous Articles - Page 17

Introduction to PDL

PDL (Portable Dynamic Loader) is a light, simple, and portable library designed especially for creating and using dynamically loaded class objects.

What's New in C++00X?

Frustrated by what C++ can do for you? Find out about how the new C++00X language standard will help you: TR1, delegating constructors, template aliasing, and strongly typed enums await! Based on the newest report N2336 released in July 2007.

Simple Thread: Part I

Learn about methods to start, pause, resume, and stop a thread by using _beginthreadex in an MFC dialog application. The sample shows how to update a MFC control as well as how to properly shut down a thread.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • You may already know about some of the benefits of Bluemix, IBM's open platform for developing and deploying mobile and web applications. Check out this webcast that focuses on building an Android application using the MobileData service, with a walk-through of the real process and workflow used to build and link the MobileData service within your application. Join IBM's subject matter experts as they show you the way to build a base application that will jumpstart you into building your own more complex app …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds