Latest Debugging Articles

The Cost of Bugs

Software defects and bugs cost $60 billion a year in the US. Check out this infographic to get a few other statistics on the impact of defects in your applications.

Writing a More Robust Debugger Visualizer in WPF

In this new installment, you'll discover how to write an even more robust version of a debugger visualizer using WIndows Presentation Foundation (WPF). You'll learn how to visualize additional data types as well as how to change the value of variables.

Writing a Debugger Visualizer in WPF: Part 1

There are lots of good examples of creating a debugger visualizer for Visual Studio, but one thing that this is common is that all of them are written using Windows form. It is, however, possible to make a debugger visualizer in WPF, and thus display data in a much more sophisticated way using modern technology.

New Features in Microsoft Visual Studio 2010 and the .NET Framework 4.0

Learn about several features relevant to developers in Visual Studio 2010 and the .NET Framework 4.0, such as parallel programming, XSLT debugging, new ASP.NET features, and new VB.NET and C# features that include the Chart control, XSD Designer, Lambda Expressions, and optional parameters.

Improving Visual C++ Debugging with Better Data Display

Code is run in a debugger for two main reasons: examining the branches of code that are being executed, and examining data values to determine why the code is behaving in a certain manner. Inspecting data values can be significantly improved by customizing the debug information. See how that can be done in the Visual C++ debugger.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Working with Parallel LINQ

Working with Parallel LINQ

LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • Most companies have elaborate procedures for managing capital. An organization's time, by contrast, goes largely unmanaged. Bain & Company used innovative people analytics tools to examine the time budgets of 17 large corporations and discovered that companies are awash in e-communications; meeting time has skyrocketed; real collaboration is limited; dysfunctional meeting behavior is on the rise; formal controls are rare; and the consequences of all this are few. Sponsored by join.me, the instant online …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date