Latest XML Articles

Linq-To-XML Style of Node Creation for C++

This article discusses the new C++ Elmax XML Library feature to implement Linq-To-XML node creation to write XML files. Linq-To-XML node creation is the natural way to create nodes with code that is structurally identical to resultant XML.

Code: XML Serializer

Serialize and deserialize XML files and XML buffer with this set of macros and classes. The serializer uses ATL String and ATL collections. Get the object representations of XML files and a means to store and load objects to and from XML.

Libxml2: Everything You Need in an XML Library

Got XML files? Look no further than libxml2, which gives you both DOM and SAX model XML parsing in a single freeware library that works with most common languages in all popular platforms including Linux and Win32/Win64.

Creating Custom WPF Controls

Custom controls assist developers in maximizing code reuse and minimizing headaches. Learn the process of creating custom controls within Microsoft's latest UI model, the Windows Presentation Foundation (WPF).

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Understanding .NET Encryption

Understanding .NET Encryption

There's no shortage of functionality built into the .NET framework to help you encrypt and secure your data. Follow along and feel more secure.

Top White Papers and Webcasts

  • What if you could rapidly grow your business while eliminating the complexity and multiple operating systems, administration and management tools, and security and compliance requirements? See how many good things happen when you standardize on open, flexible infrastructure solutions.

  • Live Event Date: February 11, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT New computing platforms, expanding information environments, recurrent security breaches and evolving regulatory frameworks are factors that security executives must contend with and address when developing their security strategy. In response to these dynamics, security executives are seeking stronger, more nimble and more pervasive security technologies to help protect business-critical information from unauthorized disclosure, loss or …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date