Latest Tutorials Articles

Windows Mobile: Working with FakeGPS

If you're building Windows Mobile apps FakeGPS could be the answer to your troubleshooting worries. Learn how to test your GPS applications using FakeGPS.

Soap Panda a Soap Client application for testing Web Services

Soap Panda is an application for testing soap based web services. Soap Panda takes WSDL as input and generates in memory .NET soap client proxy code for invoking web service methods. This code is compiled and stored in an executable file; executable file is then explored by Soap Panda application using reflection to create instances of the classes that exist in the soap proxy client dll.

Installing SQL Server 2008

Need your server and your site up and running quick? Let Greg Larsen show you what you need to know to get SQL Server running and configured.

An ADO.NET Data Services Tutorial

An ADO.NET Data Services Tutorial covering REST, querystring operations and expressions, HTTP verbs, Linq to Data Services, security, exceptions and tracing.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Understanding .NET Encryption

Understanding .NET Encryption

There's no shortage of functionality built into the .NET framework to help you encrypt and secure your data. Follow along and feel more secure.

Top White Papers and Webcasts

  • The 3rd Platform of computing, based around the four pillars of mobile computing, social media, big data and analytics, and cloud, is redefining what IT infrastructure needs to provide. Endpoint solutions must meet not only traditional data protection requirements, but also a new set of requirements driven by the explosion in mobile computing. This IDC white paper explores the customer challenges associated with safeguarding data residing on various endpoint devices, including laptops, tablets, and …

  • Live Event Date: January 27, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT For years, identity and access management (IAM) has been seen as the project of denial, restriction, limitation and sometimes failure. The processes and technologies required to enhance security seemed also destined to stifle collaboration and interfere with revenue-generating work. In fact, at times, the processes forced employees, partners and customers to spend precious time searching for ways to circumvent the IAM infrastructure in order to …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date