The Wayback Machine - https://web.archive.org/web/20160201041021/http://www.codeguru.com/csharp/csharp/cs_webservices/tutorials/

Latest Tutorials Articles

Windows Mobile: Working with FakeGPS

If you're building Windows Mobile apps FakeGPS could be the answer to your troubleshooting worries. Learn how to test your GPS applications using FakeGPS.

Soap Panda a Soap Client application for testing Web Services

Soap Panda is an application for testing soap based web services. Soap Panda takes WSDL as input and generates in memory .NET soap client proxy code for invoking web service methods. This code is compiled and stored in an executable file; executable file is then explored by Soap Panda application using reflection to create instances of the classes that exist in the soap proxy client dll.

Installing SQL Server 2008

Need your server and your site up and running quick? Let Greg Larsen show you what you need to know to get SQL Server running and configured.

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Managing Your Drives Using C#

Managing Your Drives Using C#

Sooner or later you'll need to find out about, and deal with, the various storage devices ("drives") available in your system.

Top White Papers and Webcasts

  • DevOps and Agile development play central roles in digital transformation for business and IT. This Enterprise Management Associates (EMA) Research Report explores best practices used by high-performing companies to ensure that the acceleration of app delivery doesn't compromise quality. You'll learn about: The business and customer demands driving continuous delivery Top focus areas for digital transformation initiatives The use of automation to support cross-functional collaboration

  • Live Event Date: February 10, 2016 | 1:00 p.m. EST / 10:00 a.m. PST The Dark Web is where cybercriminals are actively targeting, trading, and selling sensitive corporate and personal information. However these underground cybercriminal markets -- where company trade secrets, social security numbers, credit cards, bank accounts, medical records, malware for sale, hackers for hire, and more are all readily available -- are also rich sources of intelligence that you can use to mitigate critical risks. Check out …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date