Articles Written by Zeeshan Amjad

Switching to MVVM

Model-View-ViewModel (MVVM) is a proven design pattern used heavily in many WPF / Silverlight applications. This article focuses on implementing MVVM on existing applications rather than starting a new application. In this article we are going to see how we can take small steps towards MVVM.

Recursion Primer Using C++ Part 3

Zeeshan examines all of the Recursion dimensions (compile time/runtime and structure/generative) with the five different types of recursion (Nested Recursion, Binary Recursion, Mutual Recursion, Tail Recursion and Linear Recursion).

Writing a More Robust Debugger Visualizer in WPF

In this new installment, you'll discover how to write an even more robust version of a debugger visualizer using WIndows Presentation Foundation (WPF). You'll learn how to visualize additional data types as well as how to change the value of variables.

Writing a Debugger Visualizer in WPF: Part 1

There are lots of good examples of creating a debugger visualizer for Visual Studio, but one thing that this is common is that all of them are written using Windows form. It is, however, possible to make a debugger visualizer in WPF, and thus display data in a much more sophisticated way using modern technology.

Using WPF with Managed C++

Discuss on WPF using Managed C++. Review a sample loan amortization program.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date