Articles Written by Unknown Unknown

How to Write a COM+ Component

Discover how to write a component that can be used in a COM+ enviroment.

Using C# to Create Distribution Lists

Learn how to access the exchange domain and create a distribution list programmatically by using C# and Active Directory.

FileSystemWatcher�Why Does It Stop Working?

Ever wondered why, when using FileSystemWatcher over a network drive, it seems to forget what it's supposed to do? This article aims to explain the problem and show you how to solve it.

Accessing the Address Book Data Using MAPI

Learn the different ways of accessing the address book data using Extended MAPI. It explains how to work with both smaller and larger address books in a Global Address List of an organization.

Top White Papers and Webcasts

  • Live Event Date: December 11, 2014 @ 1:00 p.m. ET / 10:00 a.m. PT Market pressures to move more quickly and develop innovative applications are forcing organizations to rethink how they develop and release applications. The combination of public clouds and physical back-end infrastructures are a means to get applications out faster. However, these hybrid solutions complicate DevOps adoption, with application delivery pipelines that span across complex hybrid cloud and non-cloud environments. Check out this …

  • With the average hard drive now averaging one terabyte in size, the fallout from the explosion of user-created data has become an overwhelming volume of potential evidence that law-enforcement and corporate investigators spend countless hours examining. Join Us and SANS' Rob Lee for our 45-minute webinar, A Triage and Collection Strategy for Time-Sensitive Investigations, will demonstrate how to: Identify the folders and files that often contain key insights Reduce the time spent sifting through content by …

Most Popular Programming Stories

More for Developers

RSS Feeds