Read through for news and resources on software development topics, including low-code-no-code, serverless computing, programming languages, cloud native, testing and quality assurance, and development techniques.
Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
When developing in SQLServer, it is often you may find someone has your record(s) locked and you can't get to them. By querying the system databases you can quickly find out who is blocking your progress using the following query to identify the...
Manipulating the Access Control List from .NET Applications is not a common need. But still based on the Business requirements we may be in a situation to manipulate ACL from .NET Framework applications. ACL manipulation can be implemented by 2...
In a recent project, I had a need to upcast from a base class to a derived class. Below I describe the problem and the conditions where the upcast works...
Rotating a text on a compact framework has always bee tough expecially on a Pocket PC 2003/Win CE device.This article will help you to ease this problem...