More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.
Extention Methods in C# 3.0
by Ivo Stoykov
C# 3.0 offers extension methods. They allow extending existing classes without changing the class's source code or relying on inheritance.
These are static methods invoked as instance method. This…
Persistence is the capability of an application to store the state of objects and recover it when necessary. This article compares the two common types of serialization in aspects of data access, readability, and runtime cost. A ready-to…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred.
This will be demonstrated using Adobe Premiere Pro CS6.