Latest .NET Articles - Page 204

.NET Tracing Tutorial

Trace and Debug .NET classes are used to include tracing support in .NET applications. This article explains the use of these classes and implementations of tracing filtering mechanisms.

.NET Data Secrets, Part II

Discover a few more tips and tricks for working with data in .NET using Visual Basic .NET. In this installment you learn nine steps to building a quick, editable Web grid as well as a little-known technique for confirming Web deletes. Selecting multiple Web form grid items in a Hotmail style is also presented.

Five Reasons to Jump on the ASP.NET 1.1 Bandwagon

It's known that the .NET Framework version 1.1 is a minor upgrade with a relatively limited set of changes and updates. Get a gist of the changes with this list of five programming related differences between ASP.NET 1.0 and ASP.NET 1.1.

Multithreading in .NET Applications

Multithreading is a powerful tool for creating high performance applications, especially those that require user interaction. In this article, you will explore multithreading with the .NET Framework as well as learn how multiple threads can be used to improve an application's user interface.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Working with Parallel LINQ

Working with Parallel LINQ

LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • On-demand Event Event Date: January 27, 2015 For years, identity and access management (IAM) has been seen as the project of denial, restriction, limitation and sometimes failure. The processes and technologies required to enhance security seemed also destined to stifle collaboration and interfere with revenue-generating work. In fact, at times, the processes forced employees, partners and customers to spend precious time searching for ways to circumvent the IAM infrastructure in order to do their jobs. The …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date