Overview : Design patterns, speaking generically, are language-independent, (i.e. Java/C# etc.) strategies for solving common object-oriented design problems. We can summarize this to say that design […]
Continue readingCategory: Uncategorized
Synchronous vs. Asynchronous Request Handling
Synchronous The requests in the system depend on some external resource like user request. When a request comes in, ASP.NET takes one of its thread […]
Continue readingTelerik Reporting Integration with ASP.NET MVC
Introduction: Telerik Reporting is a reporting solution for all .NET cloud, web, mobile and desktop platforms that provides a full range of ready-to-use tools and […]
Continue readingSecurity in Web API – Part 2
In my blog, `Security in Web API – Part 1’, we discussed how to create APIKeyHandler and AuthHandler. In this blog, we will see how […]
Continue readingHow .Net Garbage Collection Works?
Whenever you instantiate an object in your .net application, some memory is allocated to store that object. But at some point that object may no […]
Continue readingAutomatically Run Programs and Windows Task Scheduler
Introduction The Task Scheduler has a wide variety of uses such as automatically triggering job schedule, sending email notifications to the appropriate users etc. Scheduling […]
Continue readingSecurity in Web API – Part 1
Security has always been a major concern when we talk about enterprise-level applications. This is truer, when we talk about exposing our business through services. […]
Continue readingUploading Bulk File Data Dynamically Into Oracle Database
A recent project, required that Excel file data be inserted dynamically into a Oracle database and I identified the following steps that need to be […]
Continue readingUnderstanding Content Negotiation
Content negotiation is a process where the server identifies the kind of format that the client supports and depending on the comfort of the client, […]
Continue readingHow to Manage Security Vulnerability (CSRF)
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system’s information assurance. Vulnerability is the intersection of three elements: a system susceptibility or […]
Continue readingPosting Invoices & Cash Receipts in Dynamics GP Using Post Master
Microsoft Dynamics GP is a mid-market business accounting software package used extensively in the Financial, Sales, Purchasing, Inventory, Project, Payroll functions in an organization. However, when it […]
Continue readingBeacons are Transforming the Retail World!
What would it feel like if you are on a shopping spree and the best offers in the world are showered on you in a […]
Continue readingPreventing Cross-Site scripting (XSS) attack
Introduction Cross-site scripting attack, also called XSS attack, is a security vulnerability found in web applications. In XSS, malicious script is injected into the web […]
Continue readingSix Key Benefits of ASP.NET Core 1.0 which make it Different & Better
Introduction ASP.NET Core 1.0 is not a continuation of ASP.NET 4.6. It is a whole new framework, a side-by-side project which happily lives alongside everything […]
Continue readingBasic AngularJS with Routing [Part 2]
In my last blog, Basic AngularJS with Routing [Part 1], I discussed AngularJS Controllers with examples. In this blog, I delve into Directive and Services. […]
Continue reading