Latest Visual C++ / C++ Articles - Page 22

Basics of SQL Server 2008 Locking

Relational databases are designed for multiple simultaneous users, and Microsoft SQL Server is no different. However, supporting multiple users requires some form of concurrency control, which in SQL Server's case means transaction isolation and locking. Read on to learn how SQL Server 2008 implements locking.

Free Microsoft Azure SQL Tools for Cloud Application Development

Microsoft and other third party vendors have developed a few free SQL Azure development tools for integration of your SQL Azure Database with a local on premises database. Tapas Pal looks at some of these Azure development tools and discusses how the Azure developer can use them in their day-to-day development activity.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Boxing and Unboxing in VB.NET

Boxing and Unboxing in VB.NET

The concepts of boxing and unboxing data might be second nature for many, but for newbies it's worth covering. And, the "old hands" may learn something new, as well.

Top White Papers and Webcasts

  • Discover how to quickly remediate aggressive security threats. Read this report from Forrester Research and get the facts about new automated compliance processes and how they will reduce your organization's vulnerability and risk. Learn to: Adopt a set of cyber "Rules of Engagement" Define the appropriate response through the "Response Index" Create actionable response metrics Ensure multiple levels of audit and reinforcement Plus, find out how to better align security and operations teams and put the …

  • Live Webinar June 2, 2015 - 11 am PST / 2 pm EST Your organization and brand are increasingly digital today, proliferating across websites, media outlets, social networks, search engines, mobile apps, online marketplaces and more. Each digital touch point not only enhances the value of your brand, but also represents far greater risk for your company. They increase opportunities for brand defamation and data leakage; act as discreet places to conspire and collude; and open the door to new security …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date