Skip to content

TechRepublic

Trending Now

Don’t Risk Losing Control Over Your Microsoft 365 to Ransomware!
Resource

Don’t Risk Losing Control Over Your Microsoft 365 to Ransomware!

Close-up Shot of Female IT Engineer Working in Monitoring Room. She Works with Multiple Displays.
Image: Gorodenkoff/Adobe Stock
Article

Why IT support is needed for no-code and low-code applications

Woman using Microsoft Outlook application, close-up
Image: FellowNeko/Adobe Stock
Article

How to import a Google calendar into Microsoft Outlook

report organizations ransomware
Image: normalfx/Adobe Stock
Article

Black Basta may be an all-star ransomware gang made up of former Conti and REvil members

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of daniellfox

daniellfox

Send daniellfox an email

Latest from daniellfox

  • Application Development: What’s new in ADO.NET version 2.0
    Developer

    Application Development: What’s new in ADO.NET version 2.0

    Version 2 of the .NET Framework is on the horizon. Now is the time to start thinking about ADO.NET v2 and its impact on how you'll develop applications. This article presents an overview of several new ADO.NET v2 and .NET Framework features.

    daniellfox
    Published:  March 4, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:50 AM PDT Read More See more Developer
  • Application Design: Classifying and representing data in service-oriented applications
    Enterprise Software

    Application Design: Classifying and representing data in service-oriented applications

    Get a high-level look at the types of data that service-oriented architectures use, and see how that data, both inside and outside a service, can be represented. This article will help clarify matters as you begin to consider SOA in your organization.

    daniellfox
    Published:  March 2, 2004, 12:00 AM PST Modified:  June 8, 2007, 9:50 AM PDT Read More See more Enterprise Software
  • Software Design: Using data source architectural patterns in your .NET applications
    Big Data

    Software Design: Using data source architectural patterns in your .NET applications

    Commonly accepted patterns have been established for accessing the data services layer of an application. Get an explanation of the three data source architectural patterns for encapsulating data access logic in this tutorial.

    daniellfox
    Published:  December 11, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Big Data
  • Using common domain logic patterns in your .NET applications
    Developer

    Using common domain logic patterns in your .NET applications

    In any software development, there are domain logic patterns used to determine how your application will interact with data. This tutorial explains the three architectural patterns you should consider when designing your next application.

    daniellfox
    Published:  December 1, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Developer
  • Update your smart client apps the .NET way
    Hardware

    Update your smart client apps the .NET way

    Microsoft's Updater Application Block has made managing applications across multiple workstations a lot easier. Learn how you can create updateable smart client applications in the .NET environment using this tool.

    daniellfox
    Published:  October 2, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Hardware
  • Take advantage of Microsoft’s Application Blocks for .NET
    Developer

    Take advantage of Microsoft’s Application Blocks for .NET

    In an effort to make life easier for developers, Microsoft has started to publish information on patterns and practices. These Application Blocks for .NET include source code and sample applications. Take advantage of these helpful tools and get a head start on your next project.

    daniellfox
    Published:  August 29, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Developer
  • Strong name assemblies can keep you out of DLL Hell
    Developer

    Strong name assemblies can keep you out of DLL Hell

    Strong name assemblies allow developers to simplify component updates and avoid the infamous DLL Hell. Learn about the anatomy of strong names and see how you can use them to ensure version compatibility and security in your .NET apps.

    daniellfox
    Published:  June 24, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:44 AM PDT Read More See more Developer
  • Take the proper steps to secure ActiveX controls
    Developer

    Take the proper steps to secure ActiveX controls

    ActiveX controls are powerful and useful in Web programming, but they can have negative security implications if proper steps aren't taken. Explore the risks of ActiveX controls for Web development, how they can be mitigated, and what alternatives exist.

    daniellfox
    Published:  June 23, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:45 AM PDT Read More See more Developer
  • Protect ASP.NET data with the DPAPI
    Developer

    Protect ASP.NET data with the DPAPI

    Although .NET provides some tight cryptography classes, a more efficient approach for ASP.NET developers is to implement the Data Protection API (DPAPI). See how to use DPAPI to protect the Web.config file.

    daniellfox
    Published:  April 9, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:19 AM PDT Read More See more Developer
  • Make managed code work with .NET’s CAS
    Developer

    Make managed code work with .NET’s CAS

    Developers and administrators can set permission and trust levels with code access security (CAS), while allowing the code to execute effectively.

    daniellfox
    Published:  April 2, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:23 AM PDT Read More See more Developer
  • 1
  • 2
  • Next
19 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice