Articles Written by Jeffrey Juday

Creating OData Entries in WCF Data Services

To fully exploit Open Data Protocol (OData) with WCF Data Services there are classes and interfaces a .NET app must instantiate or implement. Using a sample WCF Data Services application, this article explains how to implement data creation on an OData Endpoint.

Navigating OData and WCF Data Services

Understanding OData conventions are important to building an OData client and testing an OData Endpoint. Of all the OData conventions the most important convention a WCF Data Services developer must understand are the OData URI conventions. This article explains how OData URI conventions map to code living inside of WCF Data Services.

WCF Data Services Providers

OData's simplicity and common underlying Web standards have made it a popular Data protocol in the Microsoft stack. WCF Data Services includes several Providers that surface OData from .NET classes.

SpinWait.SpinUntil and the Task Parallel Library

Often blocking and checking is combined with some sort of timeout. SpinUntil, a static method on the SpinWait structure, combines blocking, waiting, and timeouts. New in the .NET Framework 4.0, SpinUntil simplifies many different scenarios involving the Task Parallel Library (TPL). Jeffery Juday shares some common recipes employing SpinUntil alongside TPL.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date