Articles Written by Jayant Kulkarni

WCF Chat Application

The application uses .NET 3.0 and WCF to establish a peer to peer communication using netPeerTcpBinding. It uses .NET 3.0 predefined contract and .NET predefined services.

Looking at the WCF Windows Communication Foundation

Discover Windows Communication Foundation (WCF). Microsoft introduced this technology, which is a part of .NET 3.0, to make your life easy when it comes to building distributed applications.

Add, Edit, and Delete in DataGridView

Discover the simple steps to add, edit, and delete records from DataGridView by using the SqlCommandBuilder and SqlAdapter objects. You'll also see some of the features of asynchronous programming.

Managing Exceptions in .NET

Learn about the techniques and guidelines you can use to make your application stable and less prone to errors, hande errors in a graceful manner, and avoid crashing.

Events and Delegates in Depth

Learn the details about events and delegates. You'll also read about the .NET 2.0 features for delegates.

Satellite Assemblies

Discover what satellite assemblies are, how to create them, and how to use satellite assemblies with strong named assemblies with very simple and small pieces of code chunks.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date