Articles Written by Mike Gunderloy

In Praise of the Lowly Comment

See how to make comments in your code more useful & effective for you and your fellow developers.

Getting Started with SQL Server Service Broker

Learn how the Service Broker provides the "plumbing" to let you pass messages between applications, using SQL Server as the transport mechanism.

Audio Feedback the Easy Way

Adding audio feedback to a .NET 2.0 application is easy using the System.Media namespace.

Quick Debugger Visualizers in Visual Studio 2005

Debugger visualizers allow you to provide a custom user interface for the display of particular classes of data when your program is in debug mode. While there are some complex use cases for this, you can actually derive considerable benefit from very simple debugger visualizers—ones that take ten minutes or less to build.

XML Queries and Indexing in SQL Server 2005

For the first time, SQL Server 2005 offers a native XML data type. See how you can store and query XML documents as part of a SQL Server table, and how to use XML indexes to make queries against these columns more efficient.

Introduction to SQL Server Report Builder

SQL Server 2005 is the first version to include end user reporting capabilities. See how the new Report Builder makes it easy for analysts to generate reports while avoiding the performance pitfalls of completely ad hoc reporting.

Top White Papers and Webcasts

  • You may already know about some of the benefits of Bluemix, IBM's open platform for developing and deploying mobile and web applications. Check out this webcast that focuses on building an Android application using the MobileData service, with a walk-through of the real process and workflow used to build and link the MobileData service within your application. Join IBM's subject matter experts as they show you the way to build a base application that will jumpstart you into building your own more complex app …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds