The Wayback Machine - https://web.archive.org/web/20150414011500/http://www.codeguru.com:80/csharp/.net/net_wpf/

Latest WPF Articles

3D Animation in VB.NET Using WPF - Part 3

Richard Newcombe looks at how to interact with objects in the 3D world, using a card game as a base. This article only covers the basics, but by the end of the article you will be able to interact with objects in a 3D world using the mouse.

What You Need to Know When Selecting a Grid

One of the most common misconceptions is the notion that a grid is a grid. In reality, there are several different types of grids and choosing the right one for your needs can help save substantial time and effort. Choosing the wrong grid can result in tremendous effort to make it work the way you need, which is quite frustrating. Daniel Jebaraj looks at the different types of grids and the ways in which they are typically used.

3D Animation in VB.NET Using WPF - Part 1

Richard Newcombe takes a look at the basic building blocks of a 3D world. While 2D animation was done by hard coding all of the graphics, 3D animation is much easier, using the WPF (Windows Presentation Foundation) graphical subsystem to handle the actual image rendering.

WPF RSS Reader

Learn how to build a light version RSS reader using Windows Presentation Foundation (WPF).

Latest Developer Videos

More...

Latest CodeGuru Developer Columns

Top White Papers and Webcasts

  • There is no understating the impact of security and network connectivity on today's cloud environments. Yes, clouds can scale, expedite processing, and reduce costs, but they also incur risks associated with multi-tenancy, availability, and access control. How users connect to the cloud is vital because not only are security risks non-negotiable, but performance, flexibility, and reliability are critical as well, which leads to a heavy emphasis on combining strong security with private network ecosystems. …

  • Full disk encryption is the ultimate data guardian on corporate endpoints. But when deployed without endpoint backup, it can also be the ultimate nightmare. Many organizations rely on full disk encryption to make data unreadable to unauthorized users. But without endpoint backup, the value of endpoint data is perpetually at risk. The right endpoint backup solution is necessary to ensure authorized users retain access to data should software or hardware fail. Download the executive brief to learn eight …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date