Solved

What replaced COM interface?

Posted on 2011-09-07
4
280 Views
Last Modified: 2012-05-12
I think the COM interface is obsolete, and has been replaced by something else better available to C#.

I need something like the COM interface iTunes has. With iTunes I can access it with an external program, make queries and requests.

I'm writing a C# program and need to offer that ability for an external program to make queries and requests. (e.g. "what's this value?" "Please do this.") What sort of interface is the new thing?
0
Comment
Question by:deleyd
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
zvytas earned 250 total points
ID: 36496725
WCF would be the best option.
0
 

Author Comment

by:deleyd
ID: 36497024
OK I'll go with that. Is there any subset I should focus on? This will be for a Windows Forms program with another program on the same computer that wants to 'talk' to my Windows Forms program.

(I see WCF is about all sorts of communication, like web based, network stuff I'm not doing.)
0
 
LVL 6

Assisted Solution

by:Rhino1272
Rhino1272 earned 250 total points
ID: 36498072
I think you will want to focus on using the NetTcpBinding .
0
 

Author Comment

by:deleyd
ID: 36498390
Thank you. Turns out I was unfortunately wrong about what I'll be communicating with. It's actually going to be a cell phone over Bluetooth. Someone else is choosing the cell phone, I've no idea what operating system the cell phone might have, just heard it was Bluetooth.

So is SOAP what I should be looking into? I see here my thick book on C# says:
For platform-independent communication, the SOAP protocol can be used and is directly supported from WCF

Again all we want to do is transmit simple messages like "Here's a number." "Please do this."

I don't know anything about Bluetooth or what communicating via Bluetooth might entail. (Don't even own one myself.)
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

IP addresses can be stored in a database in any of several ways.  These ways may vary based on the volume of the data.  I was dealing with quite a large amount of data for user authentication purpose, and needed a way to minimize the storage.   …
In my previous two articles we discussed Binary Serialization (http://www.experts-exchange.com/A_4362.html) and XML Serialization (http://www.experts-exchange.com/A_4425.html). In this article we will try to know more about SOAP (Simple Object Acces…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now