by Jagdish Bansiya
DP++, the tool Jagdish presents here, automates design pattern detection, identification, and classification in C++ programs.
by W. David Pitt
One application of the Visitor pattern is the familiar grep utility, which searches for a string pattern in a file. David implements grep in Java.
by Arthur T. Jolin, David Lavin, and Susan Carpenter
It's not enough that other programmers understand your class libraries -- visual builders and other code generators have to make sense of them too. Our authors discuss the differences between humans and programs, when it comes to understanding class libraries.
by Hays W. McCormick and Raphael Malveaux
Unlike design patterns, AntiPatterns focus on software failures in an attempt to understand, prevent, and recover from them. To developers, AntiPatterns are a tool that bridge the gap between architectural concepts and real-world implementations.
by Steven K. Roberts
Microship, a technomadic vehicle/environment designed for open-ended coastal and inland travel, depends on embedded systems for everything from navigation to digital-video production.
by Derrick B. Forte and Hai T. Nguyen
In this two-part article, our authors design a Windows 95-based Caller ID peripheral device built around Motorola's MC68HC(7)05P9 microcontroller. In this installment, they focus on the Call ID protocol and hardware design issues.
by Ofer LaOr
Ofer describes his oCGI2 library, which lets you develop true CGI applications using Visual Basic.
by John Boyer
The Microsoft Cryptographic API provides a standard function interface you can use to add data security features to 32-bit Windows applications. John examines this API and presents the Digital Signature Library for Microsoft CryptoAPI.
by Frank Hellwig
Maintaining pointer integrity as objects are created and deleted is a complex housekeeping chore. Frank presents an implementation of an associations class built using the Rogue Wave Tools.h++ foundation class library.
by Michael Swaine
Is there a pattern in Apple's decision to jettison the Newton? Michael unravels the whole sorted story.
by Al Stevens
Al dives into the Windows CE SDK and comes out with a metronome for his hand-held PC. As its name suggests, the Metronome application is a familiar musical tool that ticks like a clock but at an assigned frequency.
by Kenneth Golomb and Thomas Sorgie
How do you ensure secure communications from a Java applet? Kenneth and Thomas show how, using HTTPS tunneling for SSL security.
by Jon Bentley
New insights into the cost of recursion allow Jon to use this powerful tool more comfortably. And when recursion is too expensive, simple techniques maintain the elegance of recursion, without sacrificing performance.
by George Shepherd and Scot Wingo
George and Scot take a look at how two COM objects can set up communication scheme where the object calls back to the client when the object is written using the Active Template Library (ATL).
by Dennis E. Shasha
The police commissioner pays a visit to Dr. Ecco's apartment -- not looking for trouble, but answers.
by Chris Jaekl and Paul Lu
Chris and Paul take on software projects and UNIX programming, by examining Steve McConnell's Software Project Survival Guide and W. Richard Stevens' UNIX Network Programming, Volume 1: Networking APIs: Sockets and XTI, Second Edition.
by Jonathan Erickson
by you
by the DDJ staff
by Eugene Eric Kim
by Michael Swaine