Articles Written by Bipin Joshi

Writing C# Code Using SOLID Principles

Applying time proven SOLID principles make your code structured, neat and easy to maintain. Bipin Joshi examines SOLID principles and illustrates how they can be applied to your C# code.

Using the Repository Pattern with ASP.NET MVC and Entity Framework

Repository pattern is a popular way to achieve separation between the physical database, queries and other data access logic from the rest of an application. Read on to learn Repository pattern in the context of Entity Framework and ASP.NET MVC.

Creating Asynchronous Actions in ASP.NET MVC

Asynchronous actions are useful in situations where you are performing some network operation such as calling a remote service. Read on to learn more about asynchronous actions and how to create them in an ASP.NET MVC.

Using Attribute Routing in ASP.NET MVC

ASP.NET MVC 5 allows you to define routes through certain attributes, which is simpler and more intuitive than the older technique of defining routes. Read on to learn how to use attribute routing.

Handling Errors in ASP.NET MVC Applications

No matter how proficiently you developed your application there are chances that your code may not work as expected and will generate an error at runtime. ASP.NET MVC offers several techniques that help you build a robust error handling mechanism into your web application.

Top White Papers and Webcasts

  • Traditional approaches to application modernization, either manual rewrite or auto-migration tools, have been proven time and again as inefficient. Rewrite needs scarce dev skills, is slow, risky and costly; auto-migration is what Verccio Dale of Gartner defines as "a pig with a lipstick, is still a pig." Are there alternatives? Find out, download this short practical guide now!

  • 2015 is shaping up to include some of the best innovation the mobile industry has ever experienced. There will be new discoveries, new technologies, and existing giants in the vendor space will test the limits to increase productivity while ensuring the confidentiality, integrity, and availability of data. While all of this innovation is taking place, enterprises must continue to remain vigilant as cybercriminals continue to look for weaknesses to steal company data, and intellectual property by infiltrating …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date