What do you recommend to use as an offline data store, since SQL CE support is not in VS 2013?

A few years back I was architecting an occasionally connected .Net desktop application. 
VS 2010 was offering full support for Microsoft Sync Framework and SQL CE with Entity Framework. 
This seemed like the perfect marriage, so I ran with it, and the resulting software solution is still successfully running in production, years later. 
Jump forward to today, and I am architecting a new occasionally connected .Net desktop application. 
I was really looking forward to taking advantage of the advances made by Microsoft in using the tools built into VS 2013. 
However, what I discovered has dumbfounded me.  VS 2013 has no designer support for Sync Framework, and worse, built in support for SQL CE has been completely removed, including the ability to generate Entity Framework models from a
CE database using the designer. 
My question to the community is, what tools should I be using to solve the problem of offline storage in my brand new .Net application? 
I am aware of ErikEJ’s SQL Server Compact Toolbox, which brings back some support for these features in VS 2013, but it is not as fully featured as the VS 2010 native support was, plus it does not have the institutional “Microsoft” stamp on it. 
I am building a multimillion dollar corporate solution that I will have to support for many years.
 I would like to have some comfort that the technologies I select, today, will still be supported 5 years from now, unlike the way Microsoft has discontinued supporting Sync Framework and CE in the most recent VS. 
I can accept open source technologies, because there is a community behind them, or off the shelf corporate solutions, since they will be driven by financial gain, but I have trouble committing to a solution that is solely supported by an individual,
even if that person is a very talented Microsoft MVP.
Some of the features of SQL CE that I would like to keep are
Built in encryption of the file on disk
Easy querying with an ORM, like Entity Framework
Tools to easily sync up the offline data store with values from SQL Server (even better if this can be done remotely, such as over WCF)
Does not require installation of additional software on the client machine, as SQL Express would
Please, provide your feedback to let me know how you have achieved this, without resorting to simply using an older version of VS or Management Studio. 
Thank you.

Hello,
Based on your description, you can try to use SQL Server 2012 Express LocalDB.
LocalDB is created specifically for developers. It is very easy to install and requires no management, but it offers the same T-SQL language, programming surface and client-side providers as the regular SQL Server Express.
SQL Server LocalDB can work with Entity Framework and ADO.NET Syc Framework. However, there is no built-in encryption feature in LocalDB which
can let you encrypt database. You should decrypt/encrypt data on your own, for example, using
Cryptographic Functions
Reference:SQL Express v LocalDB v SQL Compact Edition
Regards,
Fanny Liu
If you have any feedback on our support, please click here.
Fanny Liu
TechNet Community Support

Similar Messages

  • Hi All, I have been using the adobe CS 5.1. What do you recommend upgrade my CS? or get the subscription on a yearly basis, thanks in advance for your input here,

    hi All, I have been using the adobe CS 5.1. What do you recommend upgrade my CS? or get the subscription on a yearly basis, thanks in advance for your input here

    The decision is ultimately yours.  You have to consider your preferences and reasons for use.
    If you are using the software primarily for personal projects, then have a suite might be all you need, and the one you have now might suffice for that as well.  If you are a professional who needs to be on the cutting edge, then you probably want to have the subscription working for you.
    Upgrading to a new CS means getting CS6, which is likely to be that last of the CS releases.  If you do that you pay for it one time and what you get when you pay is what you will have until it becomes obsolete somewhere off in the future, except for any corrective updates that might be provided.  It should hold up to be useful for some number of years.
    If you purchase a Cloud plan, you pay for it repeatedly over time - basically a monthly fee -  but you get updates and new features as they are released.  There is always a chance that newer updates could eventually out-spec the machine you own, requiring a hardware update to continue on with new releases.

  • With all of the applications available, what other applications recommended to use along with Captivate 8.

    With all of the applications available, what other applications recommended to use along with Captivate 8.  I do not heed to install all of them, just what I need.

    Personally I use both Photoshop and Audition (both in CC) a lot when using Captivate 8. There is roundtripping possible with those two Adobe applications. If you have a CC subscription try it out! And when needing HTML5 output, you can insert published Edge Animate files, to replace former Flash animations. As you can see in CP8, Edge Inspect can be used to test the output on mobile devices without having to publish or to deploy on a webserver.

  • Question:  Do I need to run and anti virus program with MAC OSX Lion? Have heard different opinions! If so what would you recommend? Was looking at Sophos. Does anyone have any experience with this? Thanks

    Question:  Do I need to run and anti virus program with MAC OSX Lion? Have heard different opinions! If so what would you recommend? Was looking at Sophos. Does anyone have any experience with this? Thanks

    Do I need to run and anti virus program with MAC OSX Lion? Have heard different opinions!
    You will continue to hear different opinions here, where thoughts range everywhere between "anti-virus software is the evil spawn of Satan" to "anyone not running anti-virus software is a fool."
    Truth is, this is still a very personal decision on a Mac. Depending on circumstances, it is still very easily possible to stay safe without using anti-virus software, but circumstances and personal preferences vary widely. Besides which, anti-virus software cannot even remotely provide you a guarantee of protection!
    To learn how to stay safe (with or without anti-virus software), and how to decide whether to use anti-virus software, see my Mac Malware Guide.

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What color is recommended to use on a black background for credits or thank yous in a video?

    What color is recommended to use on a black background for credits or thank yous in a video?
    Thank you for your help.
    barb

    barb
    If it is not too distracting, I like to overlay the credits on a still scene that sort of sums up the whole movie....just so the credits are not overshadowed by the background. That worked well for a movie of a little league baseball game and my favorite baseball little leaguer.
    Another time, for a birthday celebration for a retired very special person, I used rolling credits against just a smiling face of the birthday person with a chiming like version of happy birthday music. I kept everything light and readable with a balance between face and credits. Then as the credits ended, I eased into a thank you to him title followed by cameo shots of faces with names (about 3 cameos per image) of all the people who attended the gathering for this special person. So many times as the years go by there will be a person watching the video and asking who is that? So, my cameos were gently placed and presented and served the purpose of letting everyone know/remember who was who.
    I tend to let the work direct me in all decisions in creating the credits. Probably white is the generalized answer for lettering against a black background. Just white rolling credits on black does not necessarily grab by attention. But that is a generalization that may not apply to your specific project.
    Just some thoughts.
    ATR

  • I have just purchased an iMac, Should I install any internet security software, if so what do you recommend ?

    I have just purchased an imac, should I install any internet security software ? , if so what do you recommend ?

    You may also find this User Tip on Viruses, Trojan Detection and Removal, as well as general Internet Security and Privacy, useful: The User Tip seeks to offer guidance on the main security threats and how to avoid them.
    https://discussions.apple.com/docs/DOC-2435
    More useful information can also be found here:
    www.thesafemac.com/mmg

  • What do you recommend to get started with Dynamics Marketing? Book, You Tube, help searches, etc.? Please advise.

    Trying to get started with marketing using dynamics and tutorials, help searches and you tube seem to be fruitless. What do you recommend to get started? Buy a book to walk thru setting up company settings and creating campaigns? Need some easy steps on
    not what the software is capable of but how to do it with easy 1-2-3 steps.  Please share you thoughts!!

    Hi cb,
    I would recommend a few articles here. There are videos, walkthroughs and ebooks that you can take a look at the have
    a better understanding of not only what the product is capable of, but how to actually configure and work with it.
    Help & Training - Videos and ebooks
    TN Articles 

  • I have a great number of Hi8 video tapes and I would like to burn them onto CDs through MacBook Pro (ME665LL/A), but I do not know how to transfer those footage into Mac. What would you recommend?

    Hello everybody! My question is; my parents and I have a great number of video tapes (Hi8 and mini DV) and since I purchased a MacBook Pro (ME665LL/A) I would like to burn them onto CDs, but I do not know how to transfer those footage into Mac. What would you recommend(it can be a software, a hardware or combination of both)? By the way, I also purchased an external DVD-RW(Asus SDRW-08D2S) separately.

    Just Google "convert hi8 to dvd" and you'll find a number of software/hardware combinations that will allow you to do what you want. One important piece of the puzzle is whether or not you still have access to the video recorder(s) that the movies were shot on.
    Good luck,
    Clinton

  • HT201250 I need to upgrade from OS X 10.6.8 to 10.7 or higher to install turbotax. What do you recommend I install?

    I need to upgrade from OS X 10.6.8 to 10.7 or better in order to run TurboTax. My iMac is about 4 years old with limited space. To what do you recommend I upgrade?

    Hello kparker2112,
    I understand you would like information on upgrading your operation system. The link below will help you determine if your computer meets the requirements for the current version of OS X, which is Yosemite. I would highly recommend backing up your data before upgrading any version of OS X:
    Apple - OS X Yosemite - How to Upgrade
    For backing up your data:
    Mac OS X 10.6: Setting up and adjusting Time Machine
    Thank you for contributing to Apple Support Communities.
    Cheers,
    Bobby_D

  • Hi i belong to a non profit organization (a church) what plan should i get ? we need mainly Ae,Pr,Ps,Au,En and media encoder...what do you recommend?

    hi i belong to a non profit organization (a church) what plan should i get ? we need mainly Ae,Pr,Ps,Au,En and media encoder...what do you recommend?

    As Mylenium said, you need the full plan... check Non-Profit http://www.adobe.com/volume-licensing/non-profit.html

  • There is no mention of virus protection in any of the guides or tutorials.  Do I need to get virus protection?  If so, what do you recommend?

    Does the IPad require virus protection?what do you recommend?

    Unless you jailbreak your device, there's really no way to expose the vulnerabilities of iOS (apps are tightly controlled and run pretty much sandboxed for the most part). Welcome to Apple land where compared to other mainstream platforms, you are relatively safe from things such as a virus.

  • I have a Powerbook G4 17"  and need a replacement charger...what can you recommend

    I have a Powerbook G4 17"  and need a replacement charger...what can you recommend?

    Hello,
    All PowerBook G4's take the 65 Watt charger... Here is one as an example:
    http://www.ebay.com/itm/Genuine-Original-OEM-APPLE-iBook-PowerBook-G4-65W-AC-Pow er-Adapter-Charger-A1021-/221142197844?pt=Laptop_Adapters_Chargers&hash=item337d 1a2654
    Hope this helps...

  • What would you recommend as best quantity Ram. to run Lightroom and Photoshop CC?

    What would you recommend as best quantity Ram. to run Lightroom and Photoshop CC?

    Hi There,
    Kindly check the system requirement for the same.
    Photoshop: System requirements | Photoshop
    Lightroom:  System requirements | Lightroom
    Thanks,
    Atul Saini

  • What do you think about using exceptions for something more than errors

    if you look the java.lang.Exception description at the JDK javadoc, you can see the following text:
    "The class Exception and its subclasses are a form of Throwable that indicates conditions that a reasonable application might want to catch."
    ... we can�t see "error" word anywhere!!
    What do you think about using exceptions for something more than errors? Can be possible use them as a way for send information to upper layers?
    Thankx in regards...

    it seems that what you say is a functional way of achiveing that, yes
    but Exceptions are generally reserverd for "Exceptional" situations ie program messing up or invalid data
    it does require a fair bit of processor time to actually generate and throw an Exception.
    so, all in all its "better" to use "normal" condition flow control to achive what you want.. you can always return early, break loops, call methods to pass information

Maybe you are looking for