Latest Interfaces Articles

Getting Up and Running with the Composite UI Application Block for WPF

Building small applications from scratch is easy enough with almost any available programming technology. However, if you are assigned the task to build large applications and have the requirement to re-use code either now or tomorrow, you need to be a lot more careful. Microsoft has ready-made patterns that help you build complex Windows Presentation Foundation applications with reusability and componentized design in mind.

.NET Tip: Take Advantage of Interfaces

Stop writing more code than needed. You can streamline your code if you use interfaces. You will be able to write simpler, more flexible, and more maintainable applications when you apply interfaces.

'Using' the IDisposable Interface

The IDisposable interface can be used for far more than just the releasing of memory and resources. Learn how to use the interface to ensure that post conditions of code blocks are always met.

Using Multiple Interfaces

Multiple inheritance is not possible in C# using classes; however, you can implement multiple interfaces. This is a simple example of inheriting characteristics of multiple interfaces.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Working with Parallel LINQ

Working with Parallel LINQ

LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.

Top White Papers and Webcasts

  • Are you truly leading your team or simply managing them? Organizations need leaders and your team needs someone to follow. With some ongoing development, you could become that leader. Learn the top leadership qualities that inspire others to want to follow you and the direction of your company.

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date