Latest WCF Articles

ChannelFactory Caching in WCF 4.5 - An Insight

Arun Karthick walks you through the ChannelFactory caching feature introduced as part of WCF 4.5, providing insight into the various caching modes available, along with suitable source code samples.

Implementing a WCF Message Contract

WCF implementations normally take two different approaches; a Document style or an API style. Document style implementations are more flexible and often easier to extend and version. Also, Document style or rather, Message Contract service implementations, work well between systems with a shared message assembly. Jeffrey Juday guides you through architecting a WCF Message Contract implementation.

Learn to Create Interceptors in WCF Services

WCF runtime exposes a few stop points at various stages of execution where the interceptors can be plugged in. These interceptors can help in validating the given parameters, implementing custom serialization, choosing an operation at runtime, etc,. Read through this article to learn about creating and implementing an interceptor for a WCF service.

Working with .NET Framework 4.0 Tuples

Tuple is a very useful type introduced in .NET Framework 4.0. This article offers an insight into the Tuple class, and shows you how to create a data structure and different ways of using it in a .NET program.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Working with Parallel LINQ

Working with Parallel LINQ

LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.

Top White Papers and Webcasts

  • In the words of epic book series Game of Thrones, "Winter is coming," and there's never been a better time to be on your guard. After all, we live in a world of vicious attacks, scary data breaches, unpredictable weather, and other factors that can threaten the very existence of both your applications and your precious data. Like any enterprise or organization, Westeros is endangered by a lack of continuity and poor disaster recovery plans. This white paper explores why disaster recovery should become a …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date