Click here to Skip to main content


Great Reads

by Sacha Barber
A look at common internal DSL techniques, with a mocking framework example
by shivamkalra
In this article, we will put together a program which will allow us to play Tic-Tac-Toe game against computer with laser light and webcam for vision.
by Chesnokov Yuriy
The article describing how computers may be used in intelligent annotation of the audio, video or image media data content with perculiar phenomenon arising from such novel field that can be coined as 'AI-xenophobia' or 'Cyber-xenophobia' or 'Cyborg-xenophobia'?
by Marc Clifton
Review your project dependencies.

Latest Articles

by greggma
Provides an alternative to an ObservableCollection that is less UI intensive
by John Underhill
Rijndael 512, a Serpent/Rijndael hybrid, and a parallelized 768 bit stream cipher
by Shivprasad koirala
In this article we will try to understand C# Attributes.
by Nikita Mazhara
Describes how to implement generic methods for Microsoft Fakes Stubs and Shims using reflection constructed delegates at runtime

Research Library

With open source so pervasive, it’s surprising how little developers...


by Member 11166796 on article "How to build a simple SIP PBX in C#...
by on Article "Creating a Simple Twitter Client...
by Richard Algeni Jr on tip/trick "Fast Excel import and export"
by on SMS Client - Server
by Thorsten Bruning on article "Let your code speak for itself"

All Articles