Articles Written by Jeffrey Juday

Understanding JavaScript Web Workers

Microsoft's recent Windows 8 announcement makes HTML5 and anything HTML5/JavaScript related an important subject for any Windows developer. To most developers HTML is a "tag" based user-interface specification. However, HTML5 is more than just new "tags". Yoked to, but separate from the HTML5 specification is a specification defining background running scripts called Web Workers.

Timers and the Task Parallel Library TaskCompletionSource

Developers typically choose a Timer to have an application perform a concurrent background process after some elapsed interval. Wouldn't it be nice to couple results and Timer control in a single class? Task Parallel Library (TPL) includes a class called TaskCompletionSource that enables this scenario.

.NET Task Parallel Library Advanced Data Parallel

Much of the .NET Task Parallel Library (TPL) Data Parallel functionality is encapsulated in Parallel Loops. Unlike a regular loop, Parallel loops must partition a collection, requiring a developer to address concurrency issues like cancellation and thread safe operations. This article introduces the TPL Data Parallel core classes and concepts.

Understanding Data Parallel in the .NET Task Parallel Library

Data Parallelism and Task Parallelism are common Parallel Computing forms. Task Parallel Library (TPL) bears the "Task Parallel" name, but where does Data Parallel fit into TPL? How is Data Parallel done in the Task Parallel Library? What does Data Parallel look like in the Task Parallel Library? Read on for the answer to these questions.

Top White Papers and Webcasts

  • 2015 is shaping up to include some of the best innovation the mobile industry has ever experienced. There will be new discoveries, new technologies, and existing giants in the vendor space will test the limits to increase productivity while ensuring the confidentiality, integrity, and availability of data. While all of this innovation is taking place, enterprises must continue to remain vigilant as cybercriminals continue to look for weaknesses to steal company data, and intellectual property by infiltrating …

  • When individual departments procure cloud service for their own use, they usually don't consider the hazardous organization-wide implications. Read this paper to learn best practices for setting up an internal, IT-based cloud brokerage function that service the entire organization. Find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date