The Wayback Machine - https://web.archive.org/web/20140211021432/http://www.codeguru.com:80/vb/gen/vb_misc/algorithms/

Latest Algorithms Articles

Fuzzy Matching Demo in Access

Dare to enter the world of approximate string matching with this introduction, tutorial, and Access 2000 database demo with a 99% precision/recall.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

.NET Framework: Collections and Generics

The original release of the .NET Framework included collections as .NET was introduced to the Microsoft programming world. The .NET Framework 2.0 introduced generics to complement the System.Collections namespace and provide a more efficient and well performing option. Read on to learn more...

How to Push Data from Server to Client Using SignalR

SignalR is an Asp.Net library that pushes data to a wide variety of clients. The burden of worrying about which server push transport to use and deciding on the fallbacks has been removed from developers. Read on to learn more.

Top White Papers and Webcasts

  • This document is a 5-step guide for making the move from tape to disk backup with deduplication. Within these steps, the guide provides a concise summary of the downsides of tape backup, and then examines the superiority and economy of second-generation disk backup with data deduplication. It also presents key functional requirements for a disk backup system with deduplication as well as an example framework for assessing total cost of ownership of your existing infrastructure in the appendix.

  • This white paper discusses a major new threat vector — "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds