Latest .NET / C# Articles - Page 279

Versioning Serialized Files with Managed C++

Learn about a step-by-step technique for versioning your serialized files so that your application can handle current and older file formats, as well as properly deal with situations where the application is older than the file format being read.

Uh Oh, I Can't Create an ASP.NET Project

Having dealt with customer environments where VS.NET was installed without IIS, Paul Kimmel offers his notes on how to recover when you can't run or create projects because someone forgot to install a necessary prerequisite.

Attributes

C# provides a mechanism for defining declarative tags, called attributes, which you can place on certain entities in your source code to specify additional information. The information that attributes contain can be retrieved at run time through reflection. You can use or you can define your own custom attributes.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Using Directory Functions in .NET

Using Directory Functions in .NET

Following what you learned in an earlier column, continue with the I/O theme and take a look at the functionality available in the "Directory" class.

Top White Papers and Webcasts

  • Live Event Date: May 11, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT One of the languages that have always been supported with the Intel® RealSense™ SDK (Software Developer Kit) is JavaScript, specifically so that web-enabled apps could be created. Come hear from Intel Expert Bob Duffy as he reviews his own little "space shooting" game where the orientation of your face controls the aiming reticle to help teach developers how to write apps and games in JavaScript that can use facial and gesture …

  • Live Event Date: May 13, 2105 @ 1:00 p.m. ET / 10:00 a.m. PT Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information. Join TITUS and a guest speaker from …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date