The Wayback Machine - https://web.archive.org/web/20140524023831/http://www.codeguru.com:80/csharp/.net/net_data/

Latest Data & Databases Articles

Creating Asynchronous Actions in ASP.NET MVC

Asynchronous actions are useful in situations where you are performing some network operation such as calling a remote service. Read on to learn more about asynchronous actions and how to create them in an ASP.NET MVC.

Using Attribute Routing in ASP.NET MVC

ASP.NET MVC 5 allows you to define routes through certain attributes, which is simpler and more intuitive than the older technique of defining routes. Read on to learn how to use attribute routing.

Doing Data Extraction with Visual Basic.NET

Every developer needs to know how to extract data from a database, as it's essentially what makes your app tick. Read on to learn how to extract information from a database and put it in your VB.NET application.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Finger Printing is the New Tracking Cookie

Recently one way that developers have been looking to address the cookie abuse problem is via a method known as fingerprinting. Peter Shaw shows you how to generate a fingerprint in C# for use in your own projects.

Top White Papers and Webcasts

  • Today's competitive marketplace requires the organization to frequently release and deploy applications at the pace of user demands, with reduced cost, risk, and increased quality. This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive. Inside you will find: The business and technical drivers behind automated application release and deployment. Evaluation guides for application release and deployment solutions. …

  • Whether cloud or on-premise, mobile or local, the authentication of users remains a consistent part of the information security landscape. If an organization can strengthen their authentication mechanisms, the power shifts away from the attackers and back into an organization's favor. When a company utilizes two-factor authentication, attackers are unable to login with just a set of credentials that they were able to compromise. Read this white paper to learn how two-factor authentication is the best hope for …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds