Articles Written by Bipin Joshi

Working with Debug Windows in Visual Studio

Understanding the different windows in Visual Studio’s debugger is essential for efficient debugging. Read on to learn some of the most commonly used debug windows of Visual Studio.

Understanding .NET Attributes

Information about .NET assemblies is stored in the assembly itself. This information is called metadata. .NET allows you to put additional information in the metadata through attributes. Read on to learn what attributes are, how to use inbuilt attributes and how to create custom attributes.

Introduction to Developing Mobile Web Applications in ASP.NET MVC 4

While developing a mobile web site is challenging due to the complexity in terms of device detection, ASP.NET MVC4 provides easy ways to develop mobile web applications. Read on to learn the basics of developing web sites using ASP.NET MVC4 targeted at mobile devices.

Performing Custom Validations Using Data Annotations

Learn how to create a custom data annotation attribute and attach it with a model property, and how to add client side validation capabilities to your custom data annotation.

Using Value Providers in ASP.NET 4.5

ASP.NET 4.5 Web Forms support model binding, including Value Providers. ASP.NET provides several inbuilt value providers and also allows you to create your own. Learn more in this article from Bipin Joshi.

Working with Ajax Helper in ASP.NET MVC

Learn how to use Ajax helper to submit your HTML form using Ajax so that instead of refreshing the entire web page only a part of it will be refreshed.

Top White Papers and Webcasts

  • Live Webinar June 2, 2015 - 11 am PST / 2 pm EST Your organization and brand are increasingly digital today, proliferating across websites, media outlets, social networks, search engines, mobile apps, online marketplaces and more. Each digital touch point not only enhances the value of your brand, but also represents far greater risk for your company. They increase opportunities for brand defamation and data leakage; act as discreet places to conspire and collude; and open the door to new security …

  • Employees must exchange sensitive emails with customers and partners. These emails might contain protected health information, protected financial information, or corporate information that should not be made public. Globalscape® Mail Express® allows you to encrypt the emails that it manages so that no one but the sender and recipient--not even the administrator--can view the contents of the email. "Secure the Transfer of Sensitive Emails" is the property of GlobalSCAPE

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date