Latest WCF Articles

ChannelFactory Caching in WCF 4.5 - An Insight

Arun Karthick walks you through the ChannelFactory caching feature introduced as part of WCF 4.5, providing insight into the various caching modes available, along with suitable source code samples.

Implementing a WCF Message Contract

WCF implementations normally take two different approaches; a Document style or an API style. Document style implementations are more flexible and often easier to extend and version. Also, Document style or rather, Message Contract service implementations, work well between systems with a shared message assembly. Jeffrey Juday guides you through architecting a WCF Message Contract implementation.

Learn to Create Interceptors in WCF Services

WCF runtime exposes a few stop points at various stages of execution where the interceptors can be plugged in. These interceptors can help in validating the given parameters, implementing custom serialization, choosing an operation at runtime, etc,. Read through this article to learn about creating and implementing an interceptor for a WCF service.

Working with .NET Framework 4.0 Tuples

Tuple is a very useful type introduced in .NET Framework 4.0. This article offers an insight into the Tuple class, and shows you how to create a data structure and different ways of using it in a .NET program.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • The explosion in mobile devices and applications has generated a great deal of interest in APIs. Today's businesses are under increased pressure to make it easy to build apps, supply tools to help developers work more quickly, and deploy operational analytics so they can track users, developers, application performance, and more. Apigee Edge provides comprehensive API delivery tools and both operational and business-level analytics in an integrated platform. It is available as on-premise software or through …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds