Articles Written by Anand Narayanaswamy

Manipulate XML File Data Using C#

Learn how to display, add, edit, and delete data from a single XML file by using C# console applications. With a little effort, you can implement these techniques in Windows-based applications.

ASP.NET 2.0 Moves User Authentication One Step Forward

ASP.NET 2.0 provides new classes, methods, and controls that make implementing authentication easy. Learn how to apply the authentication functionalities of the Membership class and its methods into ASP.NET applications.

Longhorn Coming Attractions - Part 2

Explore some interesting features in the Longhorn operating system and learn some of the facts that you have to know when working with the current build.

Longhorn Coming Attractions - Part 1

Get a sneak peek at some of the cool and interesting features in the latest Longhorn build from Microsoft.

Two Quick Ways to Perform ASP.NET Authentication

By applying ASP.NET programming logic, you can store user data in either XML files or a Web configuration file and then validate users by using those files. Learn how to apply both of these simple methods of authentication.

Top White Papers and Webcasts

  • Today, users, applications, and data exist in more places than ever before, creating an unprecedented challenge for IT. How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? To better serve business demands for information everywhere, enterprises must develop new strategies for optimizing multiple kinds of networks. Read this white paper to learn how hybrid networks provide an unprecedented level of network dynamism, enterprise agility, and the …

  • Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date