Latest OOP Articles

OP-ED: Do You Hear the Sirens' Song?

Everyone has ideas about how to build software. Explore some common fallacies and collect some hints that may help you along the way. All of the ideas are the opinion of the author (who is sometimes wrong).

When OOP Becomes POO

Many people who understand OOP well enough to use it are trying to create it too. Paul Kimmel says that's often when OOP becomes POO.

Has Visual Basic Lost Its Way?

Paul Kimmel says the next big paradigm shift in programming will be based on .NET. Find out what he predicts VB's role will be in this coming change, and why he wonders whether Microsoft dropped the ball with VB.NET.

It Is a Matter of State

Learn about the State pattern, which permits an object to change its behavior dynamically by changing its internal state, creating the illusion that the object has changed.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Using Directory Functions in .NET

Using Directory Functions in .NET

Following what you learned in an earlier column, continue with the I/O theme and take a look at the functionality available in the "Directory" class.

Top White Papers and Webcasts

  • Thanks to wide spread cloud hosting and innovations small businesses can meet and exceed the legacy systems of goliath corporations. Explore the freedom to work how you want, with a phone system that will adapt to your evolving needs and actually save you lots of expense—read Get an Enterprise Phone System without High Cost and Complexity. The article clearly illustrates: The only hardware you'll need is phone equipment for advanced voice and fax. How to join all your employees, mobile devices, …

  • Live Event Date: May 13, 2105 @ 1:00 p.m. ET / 10:00 a.m. PT Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information. Join TITUS and a guest speaker from …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date