New for Windows Phone (Now) – the Async CTP
As is often the case when big events happen, sometimes some important announcements can get overlooked and/or overshadowed. Mix 2011 certainly featured big news, including Silverlight 5 Beta, the Windows […]
Performance Optimization of Silverlight Applications using Visual Studio 2010 SP1

Today I decided to work on some miscellaneous performance optimization tasks for my Sterling NoSQL Database that runs on both Silverlight and Windows Phone 7. The database will serialize any […]
Using Custom Markup Extensions in Silverlight 5
The first beta of Silverlight 5 was announced at MIX this week and is available for downloading. As such, I’ll be blogging about the new features in weeks to come. […]
Silverlight Memory Leaks and AutomationPeers
Using a memory profiling tool such as ANTS Memory Profiler from Red-Gate or MemProfiler from SciTech Software (I’m sure there others, but those were the only two I found that […]
Jounce Part 15: Asynchronous Sequential Workflows
One common complexity developers face when writing Silverlight applications is the fact that most operations are forced to asynchronous. When using the Asynchronous Programming Model (APM) or an event-driven model, […]
Making Web Apps Sizzle with Bing Maps and HTML5’s Geolocation API
A few weeks ago, I wrote about Silverlight for Windows Phone’s location API, which allows applications to ascertain their location – latitude, longitude, altitude (if GPS is available), and so […]
Jounce Part 14: Using MEF for Non-Shared Views and View Models

Even if you don’t use Jounce, this post will help you better understand how to create non-shared views and view models with the Managed Extensibility Framework (MEF). The architecture I […]
Comodo SSL Certificate Breach’s Potential Impact on Security Token Services and their Identity Providers
Recently, Iranian crackers used a username and password to make certificate requests from the Comodo Certificate Authority. These requests were successful and certificates were issued for 9 domains which are […]
Weak Event Handlers
In a few editions of my book, I showed how to implement weak event handlers which allow an object to be GCd if no other reference is keeping the object […]