Articles Written by Mike Gunderloy

In Praise of the Lowly Comment

See how to make comments in your code more useful & effective for you and your fellow developers.

Getting Started with SQL Server Service Broker

Learn how the Service Broker provides the "plumbing" to let you pass messages between applications, using SQL Server as the transport mechanism.

Audio Feedback the Easy Way

Adding audio feedback to a .NET 2.0 application is easy using the System.Media namespace.

Quick Debugger Visualizers in Visual Studio 2005

Debugger visualizers allow you to provide a custom user interface for the display of particular classes of data when your program is in debug mode. While there are some complex use cases for this, you can actually derive considerable benefit from very simple debugger visualizers—ones that take ten minutes or less to build.

XML Queries and Indexing in SQL Server 2005

For the first time, SQL Server 2005 offers a native XML data type. See how you can store and query XML documents as part of a SQL Server table, and how to use XML indexes to make queries against these columns more efficient.

Introduction to SQL Server Report Builder

SQL Server 2005 is the first version to include end user reporting capabilities. See how the new Report Builder makes it easy for analysts to generate reports while avoiding the performance pitfalls of completely ad hoc reporting.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date