Volume 31 Number 2
February 2016 Code Downloads
|ASP.NET - Progressive Enhancement with ASP.NET and React
Graham Mendrick resolves the progressively enhanced Web application versus single page application dilemma by building a stripped-down version of a TodoMVC project as a progressively enhanced SPA using React and ASP.NET.
|C# - Customizable Scripting in C#
Learn how to build a custom scripting language using C#—without using any external libraries. Vassili Kaplan extends his Split-And-Merge algorithm to parse not only mathematical expressions but also a user-defined scripting language.
|Data Points - Refactoring an ASP.NET 5/EF6 Project and Dependency Injection
Taking advantage of the dependency injection capabilities in ASP.NET 5, Julie Lerman refactors an existing EF6 solution to leverage an IoC container that makes it easier to inject object instances into logic that needs to use them.
|Essential .NET - Configuration in .NET Core
Mark Michaelis introduces the new, open source configuration support in ASP.NET 5, which is available in the Microsoft.Extensions.Configuration collection of NuGet packages, and includes both several built-in configuration providers and support for custom providers.
|Microsoft Azure - Azure Service Fabric, Q-Learning and Tic-Tac-Toe
Jesus Aguilar describes a machine learning technique for creating an intelligent back end powered by the Azure Service Fabric for determining the best play in a game of tic-tac-toe.
|Test Run - Roach Infestation Optimization
In machine learning, some numerical optimization algorithms are based on the behaviors of natural systems. James McCaffrey explores a relatively new technique called roach infestation optimization, which loosely models the foraging and aggregating behavior of roaches.
|Windows 10 - Implementing a UWP App with the Official OneDrive SDK
In the second part of a two-part series, Laurent Bugnion looks at the OneDrive SDK built by Microsoft, showing how the library can be added to a Universal Windows Platform app and how to work with the authentication scheme.