Latest Data & I/O Articles

XElement Refresher

Review using the XElement interface and discover one place where XML is still used that's potentially quite useful to you.

Understanding .NET Encryption

There's no shortage of functionality built into the .NET framework to help you encrypt and secure your data. Follow along and feel more secure.

Using XPath for Your XML Based Queries in C# Programming

XPath is one of the important elements in the W3C's XSLT standard and is often referred as a query language used to help us navigate through attributes, elements and other XML objects. It helps us identify the information and process the data in xml-based data sources in an efficient manner. Read on to learn more...

Tip: File Download in ASP.NET and Tracking the Status of Success or Failure of Download

While working on a e-commerce project I had a requirement to implement such a functionality where the success/failure of the download can be tracked. After searching for the solution I found that there is no such article related to similar problem. Then I came up with this solution after reading an article on transferring file in small packets. I hope this solution will help others struggling with similar problem.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

DateTime Refresher

DateTime Refresher

The .NET DateTime class is not just for getting the current date. It can help you do date calculations and much more.

Top White Papers and Webcasts

  • Live Event Date: May 11, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT One of the languages that have always been supported with the Intel® RealSense™ SDK (Software Developer Kit) is JavaScript, specifically so that web-enabled apps could be created. Come hear from Intel Expert Bob Duffy as he reviews his own little "space shooting" game where the orientation of your face controls the aiming reticle to help teach developers how to write apps and games in JavaScript that can use facial and gesture …

  • Live Event Date: May 13, 2105 @ 1:00 p.m. ET / 10:00 a.m. PT Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information. Join TITUS and a guest speaker from …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date