Latest Visual Basic Articles - Page 111

Where is Visual Basic 7?

While at Comdex, Paul was asked the question, 'Where is Visual Basic 7?' Paul helps to alleviate the concerns that Microsoft has abandoned Visual Basic.

Getting The Words For A Given Number

Convert a given number into its equivalent in words by using this Web service. For example, you can convert $43.25 to words such as Forty-three dollars and twenty-five cents. This can be used in accounting packages, invoices, and more.

Implementing a Custom TraceListener

A mainstay of software engineering is a concept called tracing. The basic idea is that you insert statements into your code that provide information about your application while it is running. (.NET)

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Installers for .NET

Installers for .NET

Yes, installers for your software still exist. Adding one to your release may do wonders for its popularity ratings.

Top White Papers and Webcasts

  • Live Event Date: October 29, 2014 @ 11:00 a.m. ET / 8:00 a.m. PT Are you interested in building a cognitive application using the power of IBM Watson? Need a platform that provides speed and ease for rapidly deploying this application? Join Chris Madison, Watson Solution Architect, as he walks through the process of building a Watson powered application on IBM Bluemix. Chris will talk about the new Watson Services just released on IBM bluemix, but more importantly he will do a step by step cognitive …

  • Email is the most common communication vehicle used by organizations of all shapes and sizes. Among the billions of email messages sent every day are sensitive information, critical requests, and other essential business data. IT staff bear the burden of ensuring the confidentiality, integrity, and availability of the information contained within the communication. This white paper explores the email security landscape, an assessment of the threats organizations face,  and the building blocks of an effective …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds