In recent interview in a company the panel has asked some of the candidate over there, “what is the difference between 3-tier vs 3-layer architecture?”. People might think both are same, but there are few differences actually based upon how the components are implemented and used across the software projects and solutions. I found an… Continue reading
ASP.NET MVC 2 Localization complete guide
I found a nice article on localization web application based on ASP.NET MVC framework by Alex Adamyan Read More about ASP.NET MVC 2 Localization complete guide here… Cool one i think every one should read it. Similar one we have in my organization implemented using ASP.NET MVC 1.0 too.
Favourite Quotes of the Day
“When one door of happiness closes, another opens; but often we look so long at the closed door that we do not see the one which has been opened for us.” - Helen Keller “A person who has never made a mistake has never tried anything new.” - Albert Einstein “In every person who comes near you… Continue reading
WCF Binding Comparison
I have been through different articles to find a comparison table about WCF Bindings. I just came across this comparison table by Aaron Skonnard. I hope this would be a good reference comparison table. Quoting to Aaron Skonnard’s Blog in Plural Sight(original source), In my ongoing quest to produce the simplest table possible summarizing the… Continue reading
ILMerge
ILMerge is a utility that can be used to merge multiple .NET assemblies into a single assembly. ILMerge takes a set of input assemblies and merges them into one target assembly. The first assembly in the list of input assemblies is the primary assembly. When the primary assembly is an executable, then the target assembly… Continue reading
Hands-On Labs for Microsoft Enterprise Library 5.0
A set of Hands-on Labs for the Microsoft Enterprise Library 5.0. Use this set of Hands-on Labs as a guide to learn about the application blocks included with Microsoft Enterprise Library 5.0 and practice how to leverage their capabilities in various application contexts. It includes Caching, Configuration Sources, Cryptography, Data Access, Exception Handling, Interception, Logging,… Continue reading