Latest Windows Services Articles

Windows Management Using C# Programming

Windows management has a prime place in system monitoring and administration irrespective of the technology being used. The suppleness that is achieved using the Windows management native API's are far more than that which could be achieved through other kinds of monitoring and administration application.

Deploying Separate User/Site Configurations with ClickOnce

By Matt Goebel and Rachel Baker - Microsoft's ClickOnce framework is a powerful tool for deploying and updating Windows forms applications. Learn how to deploy separate application configurations via two methods: installing and updating from different locations, and using URL parameters.

Creating an Extensible Windows Service

Windows Services are difficult to create and debug. There is no user interaction by design, and the system usually has a hard time releasing the service once installed and ran. In the first part of this two-part series, Rob Chartier shows how to create an extensible Windows Service that accepts custom plug-ins and never needs modification.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Using Directory Functions in .NET

Using Directory Functions in .NET

Following what you learned in an earlier column, continue with the I/O theme and take a look at the functionality available in the "Directory" class.

Top White Papers and Webcasts

  • Live Event Date: May 18, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT While the idea of using facial and or gesture recognitions to create a modern, intuitive game seems attractive, some developers may want to leverage Unity 3D as a way to accelerate their development. There are many different ways in which Intel and Unity Technologies have been working together to helps speed the develop of games with the Intel® RealSense™ SDK (Software Developer Kit), so come hear from a panel of experts on what we've done …

  • Live Event Date: May 13, 2105 @ 1:00 p.m. ET / 10:00 a.m. PT Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information. Join TITUS and a guest speaker from …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date