The Wayback Machine - https://web.archive.org/web/20140129141550/http://www.codeguru.com:80/cpp/controls/controls/lists,treesandcombos/

Latest Lists, Trees and Combos Articles

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

.NET Framework: Collections and Generics

The original release of the .NET Framework included collections as .NET was introduced to the Microsoft programming world. The .NET Framework 2.0 introduced generics to complement the System.Collections namespace and provide a more efficient and well performing option. Read on to learn more...

How to Push Data from Server to Client Using SignalR

SignalR is an Asp.Net library that pushes data to a wide variety of clients. The burden of worrying about which server push transport to use and deciding on the fallbacks has been removed from developers. Read on to learn more.

Top White Papers and Webcasts

  • Putting together a business case does not rank high on the list of favorite activities for many IT executives. But given the recent emphasis on governance and fiscal responsibility, the ability to put together a compelling business case is now essential to getting new projects funded. This white paper offers guidance on how to build a business case to justify a managed file transfer initiative.

  • This white paper discusses a major new threat vector — "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds