Click here to Skip to main content
12,759,971 members (30,024 online)
post an article ask a question Search our articles

Set your site filter

 Latest Articles

Featured article
31-Dec-16 17:26pm by Marc Clifton (updated) 
A Diagramming Tool
37 mins ago by RickZeeland (new) 
Create an Installer with allows to change the Forms application settings in a custom Inno Setup page.
7hrs 10mins ago by Yang Kok Wah (updated) 
Implementing shape control that supports transparency, custom design-time editors and simple animation
20hrs ago by Vipul_Poojara (new) 
write serverless functions using aws lambda and c#
23hrs ago by Richard James Moss (new) 
How to find the nearest colors using Euclidean distance
23hrs ago by Sean Rand (updated) 
This is an article to demonstrate different uses of ByType Selectors within Selenium. This is the heart of the API, Finding Element(s) using By Types. Understanding these ByType's are key in navigating, selecting and using web elements to test. Lets get going in Automation Testing!
24hrs ago by Richard James Moss (moved) 
How to load Microsoft RIFF Palette (pal) files with C#
yesterday by n.podbielski (updated) 
If you want to optimize code, which is based on Reflection, delegates may be the thing you are looking for.
yesterday by Marc Clifton (updated) 
Hashcash is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm.
yesterday by Ebenezar John Paul (updated) 
An Ideal Code Review Checklist that applies for most programming languages
Straw Poll
Which of the current tech trends interest you as a developer?
  Results   1,116 votes

News Latest News

Fri 24 Feb 2017
Algorithm underpinning Internet security falls to first-known collision attack.
Fri 24 Feb 2017
Google’s Jigsaw unit, as part of a larger effort to battle online trolling, said earlier today that it was releasing a new tool called...
Fri 24 Feb 2017
If you've got an air-gapped computer, it might be time to cover up the hard drive's leaky flashing LED lights.
Fri 24 Feb 2017
Russian cybersecurity and antivirus vendor Kaspersky has announced today the availability of KasperskyOS, its secure operating system aimed at...
Fri 24 Feb 2017
Former Amazon executive John Rossman shares his checklist for developing an internet of things strategy for your organization.

Discussions Latest Discussions

by DiamondKid
I am developing a two-player Quiz bee game LAN-Based. The players takes turn one at a time. A player will click a button to pick a question. On the first two turns, sending and receiving of data are working but on the third turn the other player didn't receive the incoming data.Anyone can...
2hrs ago by softwareguy74
Forum: article "LiteDB - A .NET NoSQL Document Store in a single data file"
by Member 13006206
I am new to Visual Basic and exploring using Marshal.StructureToPtr to store structures into allocated memory before writing to file.My question is that if I write more than one record (using structure type) using this function, would the second record replace the first in the memory...
3hrs 5mins ago by JoeH65
Forum: article "Dynamic Columns in a WPF DataGrid Control"
by Member 11856456
So my problem is when I do the initial add record the program I am making automatically skips the first which is ID 1 and starts adding like so 2, 3, 4, 5, 6. here is my code: Dim i As Integer = 0 I += 1 Try Dim sqlcon As New...

Top articles Latest Best Picks

by Alexandre Bencz  4.89/5 (23 votes)
DotNetPELib is a library which abstracts managed information such as namespaces, classes, fields, methods, and instructions. The information can then be used to generate assembly language source files, or PE executables or DLLs.
by syed shanu  4.57/5 (18 votes)
In this article, we will see in detail about the ways we can customize our ASP.ENT MVC Application. Here, in this article, we will see three methods to customize our ASP.NET MVC Bootstrap Templates.
by Marc Clifton  5.00/5 (12 votes)
Hashcash is a proof-of-work system used to limit email spam and denial-of-service attacks, and more recently has become known for its use in bitcoin (and other cryptocurrencies) as part of the mining algorithm.
by Wolfgang Foerster  5.00/5 (10 votes)
A class which helps to easily move and rotate a camera in a 3D scene
by Pete O'Hanlon  5.00/5 (10 votes)
This series of articles covers MVVM from the absolute beginning; no frameworks and no helpers, we're going to learn MVVM from the nuts and bolts.

Advertise | Privacy | Mobile
Web01 | 2.8.170217.1 | Last Updated 25 Feb 2017
Copyright © CodeProject, 1999-2017
All Rights Reserved. Terms of Service
Layout: fixed | fluid