Latest Sample Chapter Articles

Introduction to Mono for Android

Chapter 2 of "Introduction to Mono for Android" starts with an overview of Mono and then moves to a discussion of Mono for Android, configuring the development stack, and developing and deploying a “Hello Mono for Android” application -- first to an emulator and then to your Android-based phone.

The Difference Between SQL Server and SQL Azure

The fact that SQL Azure is inherently multitenant, and needs to share physical resources among all clients of the service underlies many of the feature differences between SQL Server and SQL Azure; although, a tremendous overlap exists in functionality and compatibility between the two. Read on to learn more.

Check-in policies

Check-in policies help enforce your organization's development methodology and ensure that the code being checked in passes the necessary quality requirements. In addition to using the pre-defined check-in policies, you can create custom ones.

Asynchronously Download Content In Silverlight 2

Downloading content on demand is a valuable runtime feature. Downloading application modules when needed can enhance a user's experience through reducing load times. This powerful addition can be used when retrieving fonts, media, textual content, or collections of collections of these elements as compressed packages.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Understanding .NET Encryption

Understanding .NET Encryption

There's no shortage of functionality built into the .NET framework to help you encrypt and secure your data. Follow along and feel more secure.

Top White Papers and Webcasts

  • Tintri smart storage addresses the mismatch between storage and the demands of virtualization. Built on the industry's first and leading intelligent application-aware architecture, VMstore and Tintri Global Center have the intelligence to deliver unparalleled performance and efficiency and end-to-end insights into the infrastructure, while allowing for unmatched VM control.

  • Live Event Date: January 27, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT For years, identity and access management (IAM) has been seen as the project of denial, restriction, limitation and sometimes failure. The processes and technologies required to enhance security seemed also destined to stifle collaboration and interfere with revenue-generating work. In fact, at times, the processes forced employees, partners and customers to spend precious time searching for ways to circumvent the IAM infrastructure in order to …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date