(Tom Archer) A previous article covered how to use the .NET encryption classes to compare string values using hash codes. Another usage of hash codes is in situations where a system needs to authenticate a user without storing the user’s password. This is especially useful in situations where a
Tag: Development
The First Hit – Back to Basics with .Net
(F. Scott Barker) So, how was your month…err…five months. That’s right, after being buried alive the last five months with work, not a bad thing, I am sitting down and being a good boy putting down some more thoughts about how life can be made easier. I have gotten quite a few emails with regard
Using custom configuration settings in .NET
(Phillip Perkins) The .NET Framework makes configuration settings a breeze with XML-based configurations. It also supplies the means necessary for accessing these settings through Collection classes. (R)
Write Connected Applications Using System.Net
Learn how to write better connected apps with System.Net in Visual Studio 2005. Since VS 2003, we’ve significantly enhanced the System.Net class libraries to make writing connected apps easier with added support for FTP, SMTP protocols, and the ability to listen and respond to HTTP requests.
An Introduction to Service-Oriented Architecture from a Java Developer Perspective
(Debu Panda) The use of heterogeneous technologies and applications in corporations is a reality. At a time when resources are scarce, IT shops cannot just throw away their existing applications; rather, they must leverage their existing investments. Service-oriented architecture (SOA) is popula
The Three Ms of BI: Manage, Monitor and Model
(Guy Creese) Business intelligence is awash in so many products, buzzwords and technologies that it is often hard to see the forest for the trees. It is at times like this that I put on my industry analyst’s cap and muse, “Hmm, what is this: manage, monitor or model?” This tripartite way of looking
Beware of Email Bearing Patches
(Terri Wells) If it says it’s from Microsoft and contains a “patch” attachment for you to download, don’t. It’s probably a Trojan horse.
Query Index Server with IXSSO in .NET
(Lance Bailles) There are many articles on the internet about querying Index Server using MSIDXS but few concerning IXSSO in .Net. It is my hope that this article will help more developers to return to the more efficient IXSSO when developing Index Server solutions in the .Net framework. The complet
Generic Code to Execute Stored Procedures
(Sriram Surapureddy) You can execute a single stored procedure or batch of stored procedures using collections. You can execute any stored procedure with a different number of parameters and data types. Whenever there is any change in stored procedure, you just need to add or delete parameters in th
Generating Realistic and Non-Random Sample Data
(Mark Frawley) Have you ever needed to populate a database with realistic, but generated (as opposed to actual) data, in volumes that demand automation? Such a need arises in many circumstances, such as: –Stress-testing on new applications where historical data does not yet exist. –Data Scrub