Latest XML Articles

Linq-To-XML Style of Node Creation for C++

This article discusses the new C++ Elmax XML Library feature to implement Linq-To-XML node creation to write XML files. Linq-To-XML node creation is the natural way to create nodes with code that is structurally identical to resultant XML.

Code: XML Serializer

Serialize and deserialize XML files and XML buffer with this set of macros and classes. The serializer uses ATL String and ATL collections. Get the object representations of XML files and a means to store and load objects to and from XML.

Libxml2: Everything You Need in an XML Library

Got XML files? Look no further than libxml2, which gives you both DOM and SAX model XML parsing in a single freeware library that works with most common languages in all popular platforms including Linux and Win32/Win64.

Creating Custom WPF Controls

Custom controls assist developers in maximizing code reuse and minimizing headaches. Learn the process of creating custom controls within Microsoft's latest UI model, the Windows Presentation Foundation (WPF).

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • Packaged application development teams frequently operate with limited testing environments due to time and labor constraints. By virtualizing the entire application stack, packaged application development teams can deliver business results faster, at higher quality, and with lower risk.

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds