.NET Information center

General information about .NET, Silverlight, WPF, WCF and everything else

Sunday, March 07, 2010

Headphones

4373260495_8a9d20fbee.jpg

Read more: Flickr

Posted via email from jasper22's posterous

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Search This Blog

Translate

Popular Posts

  • OSQA - Stackoverflow like QA system in Python
    OSQA is the open source Q&A system. It is more than just an FAQ page, it is a full-featured Q&A community. Users earn points and bad...
  • Reactive Extensions – Simple asynchronous repository
    In Silverlight, all webservices calls are asynchronous. Therefore, when implementing a repository in Silverlight we have to do things a litt...
  • Accessing Hardware in Silverlight using COM
    Silverlight 4 gives access to the user's microphone and camera, and adds printing capabilities, but as far as hardware goes, that's ...
  • NET DiscUtils
    DiscUtils is a .NET library to read and write ISO files and Virtual Machine disk files (VHD, VDI, XVA, VMDK, etc). DiscUtils is developed in...
  • Scaling Filesystems vs. Other Things
    David Strauss tweeted an interesting comment about using filesystems (actually he said “block devices” but I think he really meant filesyste...
  • Loading Win32 DLLs "manually" without LoadLibrary()
    Introduction  Sooner or later many people (OK, maybe not so many) start thinking about loading a DLL without LoadLibrary(). It has only a fe...
  • Sharing Solutions between VS 2008 and VS 2010
    I have a solution with several projects that I currently work on in VS 2008. I would like to use VS 2010 for it instead, to benefit from ne...
  • How to add method in Sealed class
    In Object Oriented world Sealed class is class which can not inherited, its sealed not more implementation get added. This was correct befor...
  • WPL Code Released to CodePlex
    We’ve just released the Web Protection Library code to CodePlex!  As part of this release we included the May CTP – Code only and a tutorial...
  • Essential Attack Surface Management
    To attack your system, to steal something or do something else nasty, the bad guys need to find a way in, and usually a way out as well. Thi...
Awesome Inc. theme. Theme images by chuwy. Powered by Blogger.