Click here to Skip to main content
11,642,613 members (63,370 online)

Articles by Wayne Ye (Articles: 7, Technical Blogs: 15)

Articles: 7, Technical Blogs: 15

RSS Feed

Average article rating: 4.71

Client side scripting
General
Posted: 23 Jul 2011   Updated: 6 Aug 2011   Views: 18,810   Rating: 4.89/5    Votes: 23   Popularity: 6.64
Licence: The Common Public License Version 1.0 (CPL)      Bookmarked: 64   Downloaded: 0
Delve deep into JavaScript Basic/object types, function, execution context, Scope Chain, essence of Closure and anonymous function (lambda)
HTML / CSS
General
Posted: 18 Feb 2011   Updated: 27 Feb 2011   Views: 19,740   Rating: 4.00/5    Votes: 8   Popularity: 3.61
Licence: The Code Project Open License (CPOL)      Bookmarked: 9   Downloaded: 0
Microsoft announced Internet Explorer 9 RC on Feb 10th, 2011, I summarized its most significant enhancement points including JS performance enhancement and better Web Standard Support.
Posted: 4 Sep 2011   Updated: 5 Sep 2011   Views: 27,620   Rating: 4.83/5    Votes: 9   Popularity: 4.68
Licence: The Code Project Open License (CPOL)      Bookmarked: 35   Downloaded: 709
HTML5 WebMessaging provides a simple, efficient, elegant and secure solution for Cross-Domain communication in client side, this article is an experiment for it.
HTML
Posted: 9 Jun 2011   Updated: 16 Aug 2011   Views: 220,550   Rating: 4.95/5    Votes: 131   Popularity: 10.47
Licence: The Code Project Open License (CPOL)      Bookmarked: 251   Downloaded: 6,027
HTML5 WebSocket defines a bi-directional, full-duplex communication channel operates through a single TCP connection, this article discusses its fantastic performance, the WebSocket protocol principle and its handshake mechanism, and develop a WebSocket application in action (Team Poker).
Posted: 27 Feb 2011   Updated: 15 Apr 2012   Views: 90,360   Rating: 4.90/5    Votes: 55   Popularity: 8.52
Licence: The Code Project Open License (CPOL)      Bookmarked: 80   Downloaded: 1,114
Web Storage is a brand new mechanism of storing HTTP state data, which was introduced in HTML5 to replace cookie. I delve deep into its client store mechanism and advantages compare to cookie, at the mean time I describe how JavaScript can manipulate it and also how browsers store localStorage.
Silverlight
Applications
Posted: 8 Nov 2010   Updated: 9 Nov 2010   Views: 19,810   Rating: 4.60/5    Votes: 5   Popularity: 3.22
Licence: The Code Project Open License (CPOL)      Bookmarked: 13   Downloaded: 294
Elevated trust is one of the most important new features in SL4, my post is going to concentrated discuss about elevated trust including accessing file system/isolated storage/registry, invoking COM objects and other executable files.
.NET Framework
General
Posted: 5 Nov 2010   Updated: 5 Nov 2010   Views: 48,371   Rating: 4.79/5    Votes: 10   Popularity: 4.77
Licence: The Code Project Open License (CPOL)      Bookmarked: 36   Downloaded: 2,037
This is a complete Impersonation demo in C#, impersonating a user and accessing its files and HKCU Registry entries.

Average blogs rating: 4.55

Miscellaneous
General
Posted: 24 Apr 2011   Updated: 24 Apr 2011   Views: 8,990   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: The Code Project Open License (CPOL)      Bookmarked: 22   Downloaded: 0
Time is always ticking no matter you care it or you don't care it, everyone knows it including myself, to remind myself don't waste too much time on gaming, reading news or something else, I developed a little tool which I call it "Personal Schedule Management Tool" to achieve this simple goal.
Posted: 22 Apr 2011   Updated: 25 Apr 2011   Views: 43,030   Rating: 4.57/5    Votes: 6   Popularity: 3.50
Licence: The Code Project Open License (CPOL)      Bookmarked: 7   Downloaded: 0
Describes how to Programmatically pin shortcut onto Taskbar on Windows 7
Ajax
Atlas
Posted: 25 Apr 2011   Updated: 25 Apr 2011   Views: 9,640   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 7   Downloaded: 0
BackgroundFew days ago one of my friend asked me how does Gmail change its URL while user operates inside it without page refreshing, I've no idea about that at that time, he then shared a link Ajax Pattern - Unique URLs which deep dives into this topic, as the article mentioned: Unique URL make you
General
Posted: 25 Apr 2011   Updated: 24 Nov 2011   Views: 57,140   Rating: 4.86/5    Votes: 5   Popularity: 3.38
Licence: The Code Project Open License (CPOL)      Bookmarked: 14   Downloaded: 0
Describes a standard way to implement Cross-Origin Ajax request other than JSONP or something else.
Applications & Tools
Tools with source code
Posted: 26 Apr 2011   Updated: 26 Apr 2011   Views: 47,810   Rating: 5.00/5    Votes: 8   Popularity: 4.52
Licence: The Code Project Open License (CPOL)      Bookmarked: 37   Downloaded: 0
I introduced an interesting function applied in my website: http://WayneYe.com, track visitos IP Address, translate it into Geolocation by invoking InfoDB API, and displaying Geolocation in Google Map:)
ASP.NET
General
Posted: 25 Apr 2011   Updated: 25 Apr 2011   Views: 27,160   Rating: 5.00/5    Votes: 2   Popularity: 1.51
Licence: The Code Project Open License (CPOL)      Bookmarked: 15   Downloaded: 0
Describes the importance of enabling GZIP compression in Web application.
Howto
Posted: 25 Apr 2011   Updated: 25 Apr 2011   Views: 19,780   Rating: 4.14/5    Votes: 7   Popularity: 3.52
Licence: The Code Project Open License (CPOL)      Bookmarked: 19   Downloaded: 0
Under some scenarios the developers want to encrypt some sections inside app.config or web.config file, this article How To: Encrypt Configuration Sections in ASP.NET 2.0 Using RSA describes how to do so clearly, Scott Guthrie also posted one: Encrypting Web.Config Values in ASP.NET 2.0.However, in
Silverlight
General
Posted: 9 Nov 2010   Updated: 9 Nov 2010   Views: 15,490   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
Elevated trust in Silverlight 4
Posted: 21 Sep 2014   Updated: 21 Sep 2014   Views: 2,900   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Background In Silverlight 4, Out Of Browser with elevated permission is significantly improved, now the OOB application has more privilege in accessing system resources such as the ability of accessing Isolated Storage, manipulating COM objects, access local registry entries, or even invoke Microsof
C#
General
Posted: 21 Jul 2011   Updated: 28 Jul 2011   Views: 26,160   Rating: 4.86/5    Votes: 19   Popularity: 6.20
Licence: The Code Project Open License (CPOL)      Bookmarked: 18   Downloaded: 0
Describes low level differences between several Exception handling grammar including: throw and throw ex; catch and catch (Exception ex)
.NET Framework
Samples
Posted: 9 Nov 2010   Updated: 20 Jun 2013   Views: 75,690   Rating: 4.88/5    Votes: 11   Popularity: 5.07
Licence: The Code Project Open License (CPOL)      Bookmarked: 32   Downloaded: 2,113
Under some scenarios we need impersonate another Windows account and do some work under that user’s session, for example: An enterprise ASP.NET web application provides server administrators’ ability to access the server under some specific privilege set; Server admin input their NT account informat
Internet / Network
Client/Server Development
Posted: 22 Apr 2011   Updated: 23 Apr 2011   Views: 12,790   Rating: 3.24/5    Votes: 6   Popularity: 2.43
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Introduces enhancements in IE 9 performance/web standards
Programming Tips
General
Posted: 22 Apr 2011   Updated: 25 Apr 2011   Views: 5,340   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
Study EVM (Earned Value Management) - Part 2
Posted: 23 Apr 2011   Updated: 25 Apr 2011   Views: 6,760   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
An introduction to EVM Part 1.
Uncategorised Technical Blogs
General
Posted: 21 Sep 2014   Updated: 21 Sep 2014   Views: 3,950   Rating: 4.00/5    Votes: 1   Popularity: 0.00
Licence: The Code Project Open License (CPOL)      Bookmarked: 7   Downloaded: 0
Under some scenarios we need impersonate another Windows account and do some work under that user’s session, for example: An enterprise ASP.NET web application provides server administrators’ ability to access the server under some specific privilege set; Server admin input their NT account informat
No tips have been posted.
No reference articles have been posted.

Wayne Ye
Software Developer (Senior) SAP Labs Shanghai
China China
Wayne is a software developer, Tech Lead and also a geek. He has more than 6 years' experience in Web development(server: ASP.NET (MVC), Web Service, IIS; Client: HTML/CSS/JavaScript/jQuery/AJAX), Windows development (Winform, Windows Service, WPF/Silverlight, Win32 API and WMI) and SQL Server. Deep understanding of GOF Design Patterns, S.O.L.i.D principle, MVC, MVVM, Domain Driven Design, SOA, REST and AOP.

Wayne's Geek Life http://WayneYe.com

Infinite passion on programming!


Advertise | Privacy | Mobile
Web02 | 2.8.150731.1 | Last Updated 2 Aug 2015
Copyright © CodeProject, 1999-2015
All Rights Reserved. Terms of Service
Layout: fixed | fluid