MOST RECENT
simonc,

Finally, in this series, I am going to cover some of the security issues that can trip you up when using sandboxed appdomains. DISCLAIMER: I am not a security expert, and this is by no means an exhaustive ...

Nitin Stephen Koshy,

Overview Enterprise applications of today are no longer independent, but dependent on other applications, services and components for completing their functionality. Authenticating/Trusting another application ...

D'Arcy Lussier,

Prairie Dev Con has been providing fantastic opportunities to learn, network, and have fun for software developers living in the Canadian prairies over the last four years. We're looking at running the ...

Koushal Deshpande,

I had written few blogs, one of it was technical but it was not on the domain which was accessed as much like geekswith... more over it was self reference. Today I thought why not start a technical blog ...

Patrice Calvé,

Use a ReadOnlyObservableCollection when you allow people to subscribe to changes to a collection, without allowing them to make changes to the collection. ReadOnlyObservableCollection is a object from ...

deadlydog,

I’m new to working with Xml through PowerShell and was so impressed when I discovered how easy it was to read an xml element’s value. I’m working with reading/writing .nuspec files for working with NuGet. ...

simonc,

You write a security-related application that allows addins to be used. These addins (as dlls) can be downloaded from anywhere, and, if allowed to run full-trust, could open a security hole in your application. ...