Articles Written by Jeffrey Juday

Creating OData Entries in WCF Data Services

To fully exploit Open Data Protocol (OData) with WCF Data Services there are classes and interfaces a .NET app must instantiate or implement. Using a sample WCF Data Services application, this article explains how to implement data creation on an OData Endpoint.

Navigating OData and WCF Data Services

Understanding OData conventions are important to building an OData client and testing an OData Endpoint. Of all the OData conventions the most important convention a WCF Data Services developer must understand are the OData URI conventions. This article explains how OData URI conventions map to code living inside of WCF Data Services.

WCF Data Services Providers

OData's simplicity and common underlying Web standards have made it a popular Data protocol in the Microsoft stack. WCF Data Services includes several Providers that surface OData from .NET classes.

SpinWait.SpinUntil and the Task Parallel Library

Often blocking and checking is combined with some sort of timeout. SpinUntil, a static method on the SpinWait structure, combines blocking, waiting, and timeouts. New in the .NET Framework 4.0, SpinUntil simplifies many different scenarios involving the Task Parallel Library (TPL). Jeffery Juday shares some common recipes employing SpinUntil alongside TPL.

Top White Papers and Webcasts

  • On-demand Event Event Date: February 12, 2015 The evolution of systems engineering with the SysML modeling language has resulted in improved requirements specification, better architectural definition, and better hand-off to downstream engineering. Agile methods have proven successful in the software domain, but how can these methods be applied to systems engineering? Check out this webcast and join Bruce Powel Douglass, author of Real-Time Agility, as he discusses how agile methods have had a tremendous …

  • This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2012 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date