Latest WCF Articles

ChannelFactory Caching in WCF 4.5 - An Insight

Arun Karthick walks you through the ChannelFactory caching feature introduced as part of WCF 4.5, providing insight into the various caching modes available, along with suitable source code samples.

Implementing a WCF Message Contract

WCF implementations normally take two different approaches; a Document style or an API style. Document style implementations are more flexible and often easier to extend and version. Also, Document style or rather, Message Contract service implementations, work well between systems with a shared message assembly. Jeffrey Juday guides you through architecting a WCF Message Contract implementation.

Learn to Create Interceptors in WCF Services

WCF runtime exposes a few stop points at various stages of execution where the interceptors can be plugged in. These interceptors can help in validating the given parameters, implementing custom serialization, choosing an operation at runtime, etc,. Read through this article to learn about creating and implementing an interceptor for a WCF service.

Working with .NET Framework 4.0 Tuples

Tuple is a very useful type introduced in .NET Framework 4.0. This article offers an insight into the Tuple class, and shows you how to create a data structure and different ways of using it in a .NET program.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Top White Papers and Webcasts

  • Companies undertaking an IT project need to find the right balance between cost and functionality. It's important to start by determining whether to build a solution from scratch, buy an out-of-the-box solution, or a combination of both. In reality, most projects will require some system tailoring to meet business requirements. Decision-makers must understand how much software development is enough and craft a detailed implementation plan to ensure the project's success. This white paper examines the different …

  • This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2012 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date