Latest WPF Articles

3D Animation in VB.NET Using WPF - Part 3

Richard Newcombe looks at how to interact with objects in the 3D world, using a card game as a base. This article only covers the basics, but by the end of the article you will be able to interact with objects in a 3D world using the mouse.

What You Need to Know When Selecting a Grid

One of the most common misconceptions is the notion that a grid is a grid. In reality, there are several different types of grids and choosing the right one for your needs can help save substantial time and effort. Choosing the wrong grid can result in tremendous effort to make it work the way you need, which is quite frustrating. Daniel Jebaraj looks at the different types of grids and the ways in which they are typically used.

3D Animation in VB.NET Using WPF - Part 1

Richard Newcombe takes a look at the basic building blocks of a 3D world. While 2D animation was done by hard coding all of the graphics, 3D animation is much easier, using the WPF (Windows Presentation Foundation) graphical subsystem to handle the actual image rendering.

WPF RSS Reader

Learn how to build a light version RSS reader using Windows Presentation Foundation (WPF).

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

MFC Integration with the Windows Transactional File System (TxF)

The Transactional File System (TxF), which allows access to an NTFS file system to be conducted in a transacted manner through extensions to the Windows SDK API. MFC 10, has been extended to support TxF and related technologies. This support allows existing MFC applications to be easily extended to support kernel transactions.

Top White Papers and Webcasts

  • On-demand Event Event Date: September 10, 2014 Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds