Click here to Skip to main content
Click here to Skip to main content
Alternatives

Design Patterns Part 1 - The Strategy Pattern

, 17 Jan 2010 CPOL
An article exploring the Strategy Pattern as part of the Design Patterns series. We look at an example using MD5/SHA256 hashing algorithms for strings.

Alternatives

Members may post updates or alternatives to this current article in order to show different approaches or add new features.

No alternatives have been posted.

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Share

About the Author

WebBiscuit
Software Developer Web Biscuit
United Kingdom United Kingdom
At Web Biscuit, you can find software, articles, a good dollop of quality and an unhealthy obsession over biscuits.
Website: http://www.webbiscuit.co.uk
Twitter Watch: http://twitter.com/WebBiscuitCoUk

| | Privacy | Terms of Use | Mobile
Web03 | 2.8.150327.1 | Last Updated 17 Jan 2010
Article Copyright 2010 by WebBiscuit
Everything else Copyright © CodeProject, 1999-2015
Layout: fixed | fluid