The Wayback Machine - https://web.archive.org/web/20140509022345/http://www.codeguru.com:80/cpp/data/mfc_database/dynamicdataaccess/

Latest Dynamic Data Access Articles

Incorporate Data Warehouse QA Checks into MOM 2005

Microsoft Operations Manager 2005 (MOM) is a very capable monitoring tool, but it's limited when it comes to quality assurance. Learn how to use WMI and MOM's rules and notification capabilities to run automated data warehouse QA checks.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Finger Printing is the New Tracking Cookie

Recently one way that developers have been looking to address the cookie abuse problem is via a method known as fingerprinting. Peter Shaw shows you how to generate a fingerprint in C# for use in your own projects.

Top White Papers and Webcasts

  • You probably have several goals for your patient portal of choice. Is "community" one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process. Read this white paper to learn more. "3 Ways Clinicians can Leverage a Patient Portal to Craft a Healthcare Community" is a published document owned by www.medhost.com

  • Small businesses are the backbone of the economy, employing more than half of all private sector workers. But small businesses are also easy targets for cyber criminals. Hackers don't want a challenge, they want your money and they typically go for the low-hanging fruit. Unfortunately small businesses are usually easier targets. Whether you have in-house IT support or you use a third-party to manage your security for you, read this white paper for some tips for protecting your company.

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds