by bill-s, 2020-11-30T02:35:22.385Z
This article describes the ASP.NET MVC request life cycle, it explains how request flows from the user browser to MVC application and vice versa.
This gives you detail description of ASP.NET MVC request steps like routing, MvcHandler, Controller, Action Execution, View Result, View Engine, and View.
by bill-s, 2020-11-30T02:19:52.332Z
The .NET Framework provides a great programming model that enables high performance code using an easy to understand syntax. However, this can often give developers a false sense of security, and the language and runtime aren’t without pitfalls. Ideally static analysers, like the Microsoft.VisualStudio.Threading.Analyzers Roslyn analysers, would catch all these issues at build time. While they do help catch a lot of mistakes, they can’t catch everything, so it’s important to understand the problems and how to avoid them.
by bill-s, 2020-11-30T02:19:31.812Z
The same day .NET 5 was released I shared a single screenshot showing how much faster .NET 5 is relatively to .NET Core 3.1. I promised to share more data later — and here it is.
by bill-s, 2020-11-30T02:20:19.032Z
Generics is a powerful feature available in many statically typed languages. It offers a way to write code that seamlessly operates against many different types, by targeting the features they share rather than the types themselves. This provides the means for building flexible and reusable components without having to sacrifice type safety or introduce unnecessary duplication.
by bill-s, 2020-11-30T02:36:42.632Z
Learn to create a JWT Token (JSON Web Token) authentication / authorization with ASP.NET Core in three simple steps.
by bill-s, 2020-11-30T02:19:17.287Z
gRPC is a high performance program-to-program communication framework highly suitable to efficiently connect services and, as such, to serve as the foundation for the micro-service architecture. I will not to bore you with the marketing speech, go for the details to the official site
by bill-s, 2020-11-30T02:37:55.436Z
Hello, my name is Kati Frantz, and thank you so much for checking out this tutorial. I want to talk about how to handle JWTs effectively and securely on the client-side.
The most popular practice in the industry today is to save your JWT in a cookie or local storage. I've done this for a couple of years, and I have even taught others to do the same, but I didn't think it was a big deal until one of the applications I worked on was hacked.