Some comments on Stored Procedures
Some comments on Stored Procedures
There are many advatages of stored procedures. some of them are: Procedures are on the server so messages don’t need to go back and forth to the client...
Jun 15, 2009
SPEC INDIA
What is Cryptography?
What is Cryptography?
Cryptography is one of the most complex aspects of software development that any developer will use. The theory of modern cryptographic techniques is extremely difficult to understand and...
Jun 15, 2009
SPEC INDIA
Runtime Security in .NET
Runtime Security in .NET
A principal goal of the Microsoft .NET Framework is to make computing more secure—especially with respect to the use of mobile code and distributed systems. Most modern operating...
Jun 15, 2009
SPEC INDIA
What are the benifits of ADO.NET?
What are the benifits of ADO.NET?
ADO.NET brings with it a number of benefits, which fall into the following categories: Interoperability The ability to communicate across heterogeneous environments.  ADO.NET addresses the common data-exchange limitation...
Jun 15, 2009
SPEC INDIA
What XML Is and What it is not…
What XML Is and What it is not…
What XML is? Very easy to use and code. The complete specification document is less than 40 pages long. XML is designed to be easier to code than...
Jun 15, 2009
SPEC INDIA
What is Grid Computing?
What is Grid Computing?
Grid computing is all about using the untapped resources of computers connected to a network. IBM perhaps defines it most succinctly: Grid computing is applying resources from many...
Jun 15, 2009
SPEC INDIA
What is Windows Communication Foundation(WCF)?
What is Windows Communication Foundation(WCF)?
Originally tagged with the code name “Indigo”, WCF is one of the four new application programming interfaces introduced with .NET Framework 3.0, which was released in December 2006....
Jun 15, 2009
SPEC INDIA
Security Mechanism in .Net
Security Mechanism in .Net
.NET has its own security mechanism with two general features: Code Access Security (CAS), and validation and verification. Code Access Security is based on evidence that is associated...
Jun 15, 2009
SPEC INDIA

Guest Contribution

We are looking for industry experts to contribute to our blog section through fresh and innovative content.

Write For Us

Our Portfolio

Proven Solutions Across Industries
Technology for Real-Life

Visit Our Portfolio