Latest Web Services Articles - Page 5

Soap Panda a Soap Client application for testing Web Services

Soap Panda is an application for testing soap based web services. Soap Panda takes WSDL as input and generates in memory .NET soap client proxy code for invoking web service methods. This code is compiled and stored in an executable file; executable file is then explored by Soap Panda application using reflection to create instances of the classes that exist in the soap proxy client dll.

Installing SQL Server 2008

Need your server and your site up and running quick? Let Greg Larsen show you what you need to know to get SQL Server running and configured.

An ADO.NET Data Services Tutorial

An ADO.NET Data Services Tutorial covering REST, querystring operations and expressions, HTTP verbs, Linq to Data Services, security, exceptions and tracing.

Modifying Spell Check for SharePoint Server 2007

A valuable feature of SharePoint 2007 is the introduction of an online spell check program. But, that list of words may not always fit your needs. See how you can modify the spell check to include words specific to your industry.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

The Sorry State of .NET ORMs

Looking to work with a non Microsoft Database in .NET? You need to know what ORM's are available, and why you can't currently use Entity Framework.

Top White Papers and Webcasts

  • As everyone scrambles to protect customers and consumers from the Heartbleed virus, there will be a variety of mitigating solutions offered up to address this pesky bug. There are a variety of points within the data path where solutions could be put into place to mitigate this (and similar) vulnerabilities and customers must choose the most strategic point in the network at which to deploy their selected mitigation. Read this white paper to learn the ins and outs of mitigating the risk of Heartbleed and the …

  • Email is the most common communication vehicle used by organizations of all shapes and sizes. Among the billions of email messages sent every day are sensitive information, critical requests, and other essential business data. IT staff bear the burden of ensuring the confidentiality, integrity, and availability of the information contained within the communication. This white paper explores the email security landscape, an assessment of the threats organizations face,  and the building blocks of an effective …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds