Click here to Skip to main content


Great Reads

by Sacha Barber
A look at common internal DSL techniques, with a mocking framework example
by shivamkalra
In this article, we will put together a program which will allow us to play Tic-Tac-Toe game against computer with laser light and webcam for vision.
by Chesnokov Yuriy
The article describing how computers may be used in intelligent annotation of the audio, video or image media data content with perculiar phenomenon arising from such novel field that can be coined as 'AI-xenophobia' or 'Cyber-xenophobia' or 'Cyborg-xenophobia'?
by Marc Clifton
Review your project dependencies.

Latest Articles

by Nicolas Dorier
Leverage Azure, powershell and NBitcoin for a fault tolerant and scalable block chain indexer
by Akhil Mittal
Access modifiers (or access specifiers) are keywords in object-oriented languages that set the accessibility of classes, methods, and other members. Access modifiers are a specific part of programming language syntax used to facilitate the encapsulation of components.
by Akhil Mittal
Day 6: Understanding Enums in C#.My article of the series “Diving in OOP” will explain enum datatype in C#.

Research Library

By easing the process of integrating business events into automated...
Use these flashcards along with the popular open source integration...
If you are considering deploying business process management (BPM)...
IDC studied the business value and benefits that three JBoss customers...


by John Ritchie on Using Word's spellchecker in C#
by chocolade on A simple C# global low level keyboard hook
by John Willson on tip/trick "OData"
by George Kimionis on article "NBitcoin Indexer : A scalable and...
by Kundan Singh Chouhan on article "Diving in OOP (Day 6): Understanding...

All Articles