Click here to Skip to main content

Articles by Wayne Ye (Articles: 7, Technical Blogs: 15)

Articles: 7, Technical Blogs: 15

RSS Feed

Average article rating: 4.72

Client side scripting
General
Posted: 23 Jul 2011   Updated: 6 Aug 2011   Views: 16,941   Rating: 4.88/5    Votes: 22   Popularity: 6.54
Licence: The Common Public License Version 1.0 (CPL)      Bookmarked: 61   Downloaded: 0
Delve deep into JavaScript Basic/object types, function, execution context, Scope Chain, essence of Closure and anonymous function (lambda)
HTML / CSS
General
Posted: 18 Feb 2011   Updated: 27 Feb 2011   Views: 17,488   Rating: 4.00/5    Votes: 8   Popularity: 3.61
Licence: The Code Project Open License (CPOL)      Bookmarked: 9   Downloaded: 0
Microsoft announced Internet Explorer 9 RC on Feb 10th, 2011, I summarized its most significant enhancement points including JS performance enhancement and better Web Standard Support.
Posted: 4 Sep 2011   Updated: 5 Sep 2011   Views: 22,576   Rating: 4.91/5    Votes: 8   Popularity: 4.42
Licence: The Code Project Open License (CPOL)      Bookmarked: 34   Downloaded: 636
HTML5 WebMessaging provides a simple, efficient, elegant and secure solution for Cross-Domain communication in client side, this article is an experiment for it.
HTML
Posted: 9 Jun 2011   Updated: 16 Aug 2011   Views: 192,756   Rating: 4.95/5    Votes: 130   Popularity: 10.45
Licence: The Code Project Open License (CPOL)      Bookmarked: 245   Downloaded: 5,603
HTML5 WebSocket defines a bi-directional, full-duplex communication channel operates through a single TCP connection, this article discusses its fantastic performance, the WebSocket protocol principle and its handshake mechanism, and develop a WebSocket application in action (Team Poker).
Posted: 27 Feb 2011   Updated: 15 Apr 2012   Views: 78,971   Rating: 4.90/5    Votes: 55   Popularity: 8.52
Licence: The Code Project Open License (CPOL)      Bookmarked: 80   Downloaded: 1,063
Web Storage is a brand new mechanism of storing HTTP state data, which was introduced in HTML5 to replace cookie. I delve deep into its client store mechanism and advantages compare to cookie, at the mean time I describe how JavaScript can manipulate it and also how browsers store localStorage.
Silverlight
Applications
Posted: 8 Nov 2010   Updated: 9 Nov 2010   Views: 16,413   Rating: 4.60/5    Votes: 5   Popularity: 3.22
Licence: The Code Project Open License (CPOL)      Bookmarked: 13   Downloaded: 259
Elevated trust is one of the most important new features in SL4, my post is going to concentrated discuss about elevated trust including accessing file system/isolated storage/registry, invoking COM objects and other executable files.
.NET Framework
General
Posted: 5 Nov 2010   Updated: 5 Nov 2010   Views: 37,968   Rating: 4.79/5    Votes: 10   Popularity: 4.77
Licence: The Code Project Open License (CPOL)      Bookmarked: 31   Downloaded: 1,725
This is a complete Impersonation demo in C#, impersonating a user and accessing its files and HKCU Registry entries.

Average blogs rating: 4.56

Miscellaneous
General
Posted: 24 Apr 2011   Updated: 24 Apr 2011   Views: 8,088   Rating: 5.00/5    Votes: 4   Popularity: 3.01
Licence: The Code Project Open License (CPOL)      Bookmarked: 22   Downloaded: 0
Time is always ticking no matter you care it or you don't care it, everyone knows it including myself, to remind myself don't waste too much time on gaming, reading news or something else, I developed a little tool which I call it "Personal Schedule Management Tool" to achieve this simple goal.
Posted: 22 Apr 2011   Updated: 25 Apr 2011   Views: 32,937   Rating: 4.57/5    Votes: 6   Popularity: 3.50
Licence: The Code Project Open License (CPOL)      Bookmarked: 6   Downloaded: 0
Describes how to Programmatically pin shortcut onto Taskbar on Windows 7
Ajax
Atlas
Posted: 25 Apr 2011   Updated: 25 Apr 2011   Views: 8,629   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 7   Downloaded: 0
BackgroundFew days ago one of my friend asked me how does Gmail change its URL while user operates inside it without page refreshing, I've no idea about that at that time, he then shared a link Ajax Pattern - Unique URLs which deep dives into this topic, as the article mentioned: Unique URL make you
General
Posted: 25 Apr 2011   Updated: 24 Nov 2011   Views: 45,172   Rating: 4.83/5    Votes: 4   Popularity: 2.91
Licence: The Code Project Open License (CPOL)      Bookmarked: 14   Downloaded: 0
Describes a standard way to implement Cross-Origin Ajax request other than JSONP or something else.
Applications & Tools
Tools with source code
Posted: 26 Apr 2011   Updated: 26 Apr 2011   Views: 36,879   Rating: 5.00/5    Votes: 6   Popularity: 3.89
Licence: The Code Project Open License (CPOL)      Bookmarked: 32   Downloaded: 0
I introduced an interesting function applied in my website: http://WayneYe.com, track visitos IP Address, translate it into Geolocation by invoking InfoDB API, and displaying Geolocation in Google Map:)
ASP.NET
General
Posted: 25 Apr 2011   Updated: 25 Apr 2011   Views: 19,911   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 13   Downloaded: 0
Describes the importance of enabling GZIP compression in Web application.
Howto
Posted: 25 Apr 2011   Updated: 25 Apr 2011   Views: 16,888   Rating: 4.14/5    Votes: 7   Popularity: 3.52
Licence: The Code Project Open License (CPOL)      Bookmarked: 19   Downloaded: 0
Under some scenarios the developers want to encrypt some sections inside app.config or web.config file, this article How To: Encrypt Configuration Sections in ASP.NET 2.0 Using RSA describes how to do so clearly, Scott Guthrie also posted one: Encrypting Web.Config Values in ASP.NET 2.0.However, in
Silverlight
General
Posted: 9 Nov 2010   Updated: 9 Nov 2010   Views: 13,869   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 2   Downloaded: 0
Elevated trust in Silverlight 4
Posted: 21 Sep 2014   Updated: 21 Sep 2014   Views: 775   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 1   Downloaded: 0
Background In Silverlight 4, Out Of Browser with elevated permission is significantly improved, now the OOB application has more privilege in accessing system resources such as the ability of accessing Isolated Storage, manipulating COM objects, access local registry entries, or even invoke Microsof
C#
General
Posted: 21 Jul 2011   Updated: 28 Jul 2011   Views: 23,967   Rating: 4.86/5    Votes: 19   Popularity: 6.20
Licence: The Code Project Open License (CPOL)      Bookmarked: 18   Downloaded: 0
Describes low level differences between several Exception handling grammar including: throw and throw ex; catch and catch (Exception ex)
.NET Framework
Samples
Posted: 9 Nov 2010   Updated: 20 Jun 2013   Views: 54,454   Rating: 4.88/5    Votes: 11   Popularity: 5.07
Licence: The Code Project Open License (CPOL)      Bookmarked: 25   Downloaded: 1,246
Under some scenarios we need impersonate another Windows account and do some work under that user’s session, for example: An enterprise ASP.NET web application provides server administrators’ ability to access the server under some specific privilege set; Server admin input their NT account informat
Internet / Network
Client/Server Development
Posted: 22 Apr 2011   Updated: 23 Apr 2011   Views: 11,296   Rating: 3.24/5    Votes: 6   Popularity: 2.43
Licence: The Code Project Open License (CPOL)      Bookmarked: 0   Downloaded: 0
Introduces enhancements in IE 9 performance/web standards
Programming Tips
General
Posted: 22 Apr 2011   Updated: 25 Apr 2011   Views: 4,877   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
Study EVM (Earned Value Management) - Part 2
Posted: 23 Apr 2011   Updated: 25 Apr 2011   Views: 6,062   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
An introduction to EVM Part 1.
Uncategorised Technical Blogs
General
Posted: 21 Sep 2014   Updated: 21 Sep 2014   Views: 1,081   Rating: 0.0 / 5    Votes: 0   Popularity: 0.0
Licence: The Code Project Open License (CPOL)      Bookmarked: 3   Downloaded: 0
Under some scenarios we need impersonate another Windows account and do some work under that user’s session, for example: An enterprise ASP.NET web application provides server administrators’ ability to access the server under some specific privilege set; Server admin input their NT account informat
No tips have been posted.
No reference articles have been posted.

Wayne Ye
Software Developer (Senior) SAP Labs Shanghai
China China
Wayne is a software developer, Tech Lead and also a geek. He has more than 6 years' experience in Web development(server: ASP.NET (MVC), Web Service, IIS; Client: HTML/CSS/JavaScript/jQuery/AJAX), Windows development (Winform, Windows Service, WPF/Silverlight, Win32 API and WMI) and SQL Server. Deep understanding of GOF Design Patterns, S.O.L.i.D principle, MVC, MVVM, Domain Driven Design, SOA, REST and AOP.
 
Wayne's Geek Life http://WayneYe.com
 
Infinite passion on programming!
Follow on   Twitter


Advertise | Privacy | Mobile
Web04 | 2.8.140921.1 | Last Updated 22 Sep 2014
Copyright © CodeProject, 1999-2014
All Rights Reserved. Terms of Service
Layout: fixed | fluid