Latest Sample Chapter Articles

Introduction to Mono for Android

Chapter 2 of "Introduction to Mono for Android" starts with an overview of Mono and then moves to a discussion of Mono for Android, configuring the development stack, and developing and deploying a “Hello Mono for Android” application -- first to an emulator and then to your Android-based phone.

The Difference Between SQL Server and SQL Azure

The fact that SQL Azure is inherently multitenant, and needs to share physical resources among all clients of the service underlies many of the feature differences between SQL Server and SQL Azure; although, a tremendous overlap exists in functionality and compatibility between the two. Read on to learn more.

Check-in policies

Check-in policies help enforce your organization's development methodology and ensure that the code being checked in passes the necessary quality requirements. In addition to using the pre-defined check-in policies, you can create custom ones.

Asynchronously Download Content In Silverlight 2

Downloading content on demand is a valuable runtime feature. Downloading application modules when needed can enhance a user's experience through reducing load times. This powerful addition can be used when retrieving fonts, media, textual content, or collections of collections of these elements as compressed packages.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Working with Parallel LINQ

Working with Parallel LINQ

LINQ has a trick up its sleeve from .NET 4 onwards for dealing with large amounts of data and multiple CPUs. Learn to leverage LINQ.

Top White Papers and Webcasts

  • Today's agile organizations pose operations teams with a tremendous challenge: to deploy new releases to production immediately after development and testing is completed. To ensure that applications are deployed successfully, an automatic and transparent process is required. We refer to this process as Zero Touch Deployment™. This white paper reviews two approaches to Zero Touch Deployment--a script-based solution and a release automation platform. The article discusses how each can solve the key …

  • Information is data with context. The era of Big Data has begun demonstrating to information security that there is more that can, and must, be done to identify threats, reduce risk, address fraud, and improve compliance monitoring activities by bringing better context to data and thereby creating information for actionable intelligence. This analyst report sets the stage and provides insights into IT and information security practitioners' perceptions of the impediments to, and the solutions necessary for, …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date