ADO.NET Programming Model

ADO.NET Programming Model

The ADO.NET programming model is built around two groups of objects: Managed provider objects: These objects provide direct, connected access to a data source and the ability to directly interact… Read more
What is authentication?

What is authentication?

Authentication, the process of proving an individual is who he or she claims to be, is one of the most critical components of your security infrastructure. Users need information, but… Read more
What is application concurrency?

What is application concurrency?

In a multiuser system or application, concurrency is a major issue that the development team must address. Concurrency, in the context of a software application, is the handling of multiple… Read more
Web Services and Security

Web Services and Security

System-level security allows for restricting access to the web services from unauthorized clients. It is done in a declarative fashion, whereas application-level security is more flexible. With system-level security, you… Read more
What are Triggers?

What are Triggers?

A trigger is a special type of stored procedure that executes when a specified DML operation (an INSERT, DELETE, or UPDATE, or any combination thereof) occurs. They're typically used to… Read more
Multiplexing Techniques in Wireless

Multiplexing Techniques in Wireless

Multiplexing is a term used to describe how a signal can be divided among multiple users. This spectrum sharing allows wireless operators to maximize the use of their spectrum to… Read more
Some Important features of Dot Net.

Some Important features of Dot Net.

Interoperability support (Interop) Migrating to .NET from existing languages and platforms has been made much easier. Especially if that environment is COM or Java. COM, Interop is built into the… Read more