Articles Written by Jeffrey Juday

Creating OData Entries in WCF Data Services

To fully exploit Open Data Protocol (OData) with WCF Data Services there are classes and interfaces a .NET app must instantiate or implement. Using a sample WCF Data Services application, this article explains how to implement data creation on an OData Endpoint.

Navigating OData and WCF Data Services

Understanding OData conventions are important to building an OData client and testing an OData Endpoint. Of all the OData conventions the most important convention a WCF Data Services developer must understand are the OData URI conventions. This article explains how OData URI conventions map to code living inside of WCF Data Services.

WCF Data Services Providers

OData's simplicity and common underlying Web standards have made it a popular Data protocol in the Microsoft stack. WCF Data Services includes several Providers that surface OData from .NET classes.

SpinWait.SpinUntil and the Task Parallel Library

Often blocking and checking is combined with some sort of timeout. SpinUntil, a static method on the SpinWait structure, combines blocking, waiting, and timeouts. New in the .NET Framework 4.0, SpinUntil simplifies many different scenarios involving the Task Parallel Library (TPL). Jeffery Juday shares some common recipes employing SpinUntil alongside TPL.

Top White Papers and Webcasts

  • By providing developers with the right tools to detect, understand, and fix problems early, your business can simplify software development, shorten development lifecycles, and improve the quality of software code. The end result is increased innovation, secure applications, and a faster time to market — all at a lower cost.

  • Live Webinar June 2, 2015 - 11 am PST / 2 pm EST Your organization and brand are increasingly digital today, proliferating across websites, media outlets, social networks, search engines, mobile apps, online marketplaces and more. Each digital touch point not only enhances the value of your brand, but also represents far greater risk for your company. They increase opportunities for brand defamation and data leakage; act as discreet places to conspire and collude; and open the door to new security …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date