Latest C# Articles - Page 20

Tip: File Download in ASP.NET and Tracking the Status of Success or Failure of Download

While working on a e-commerce project I had a requirement to implement such a functionality where the success/failure of the download can be tracked. After searching for the solution I found that there is no such article related to similar problem. Then I came up with this solution after reading an article on transferring file in small packets. I hope this solution will help others struggling with similar problem.

Optional and Named Parameters in C# Programming

In this installment we'll explore optional and named parameters in C# programming. This is an option that has long been around within the Visual Basic language, but is newly introduced in to the C# language in the .NET Framework version 4.0.

Free Microsoft Azure SQL Tools for Cloud Application Development

Microsoft and other third party vendors have developed a few free SQL Azure development tools for integration of your SQL Azure Database with a local on premises database. Tapas Pal looks at some of these Azure development tools and discusses how the Azure developer can use them in their day-to-day development activity.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Top White Papers and Webcasts

  • On-demand Event Event Date: March 19, 2015 The 2015 Enterprise Mobile Application Survey asked 250 mobility professionals what their biggest mobile challenges are, how many employees they are equipping with mobile apps, and their methods for driving value with mobility. Join Dan Woods, Editor and CTO of CITO Research, and Alan Murray, SVP of Products at Apperian, as they break down the results of this survey and discuss how enterprises are using mobile application management and private app stores to …

  • Live Event Date: May 13, 2105 @ 1:00 p.m. ET / 10:00 a.m. PT Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information. Join TITUS and a guest speaker from …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date