Articles Written by Paul Kimmel

SQL CLR Integration in SQL Server 2008

Is some of your business logic in code and some in SQL Server? Then, just call the SQL from the .NET framework and the .NET framework from SQL with CLR integration. Here are all the steps you need to get started.

Working with Large Memory-Mapped Files in VB 2010

Memory mapped files use the system's memory manager and lets you treat large files as if they were in-memory objects, supporting extremely large file access, faster access, and multiple, simultaneous processes accessing the same file.

Using BigInteger in Visual Basic 2010

Encryption and keeping secrets depends on large prime numbers that are too big to crack by brute force. .NET framework 4.0 introduces the BigInteger that has no theoretical upper and lower bounds.

Searching for Breakpoints in Microsoft Visual Studio 2010

Microsoft Visual Studio has extensive support for setting breakpoints with extra conditions, including code, and then searching for and managing those breakpoints. Read more to see how to put beakpoints to work for you.

Understanding Covariance and Contravariance

There are as many explanations, examples, and mathematical descriptions for covariance and contravariance as you care to explore, but all of this information adds to the confusion. This article shows you why they are important concepts for software developers and how you can leverage variance when you design your code.

Top White Papers and Webcasts

  • Lenovo recommends Windows 8 Pro. "I dropped my laptop getting out of the taxi." This probably sounds familiar to most IT professionals. If your employees are traveling, you know their devices are in for a rough go. Whether it's a trip to the conference room or a convention out of town, any time equipment leaves a user's desk it is at risk of being put into harm's way. Stay connected at all times, whether at the office or on the go, with agile, durable, and flexible devices like the Lenovo® …

  • When individual departments procure cloud service for their own use, they usually don't consider the hazardous organization-wide implications. Read this paper to learn best practices for setting up an internal, IT-based cloud brokerage function that service the entire organization. Find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date