Welcome!

Christopher Frenz

Subscribe to Christopher Frenz: eMailAlertsEmail Alerts
Get Christopher Frenz via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Christopher Frenz

The Mobile Internet Toolkit comes prepackaged with a variety of controls that address the most common mobile computing tasks. However, specialized tasks can arise that these generic controls are not powerful enough to address, or for which they simply fail to meet the requirements. In these cases it is beneficial to develop a custom control that is suited to fulfilling the required tasks. In this article, I will concentrate on developing and implementing such custom controls within a mobile application. The primary focus will not be on creating custom user controls and/or inherited controls since these can be created for the Mobile Internet Toolkit in much the same way as a standard ASP.NET control. Rather, I will focus on creating custom controls from scratch so I can address some of the unique issues of mobile Internet development. Before I begin, it is essential... (more)

Demystifying Regular Expressions

The ability to perform pattern-matching operations on text is a skill that is highly useful to any programmer. Whether you are creating a routine to validate data entered into a form, performing parsing and mining on data sets, or searching for sequence similarities in the human genome, chances are that the ability to construct a regular expression will be of great value to you. A single regular expression can often be used to create the same pattern-matching functionality that would otherwise require a lengthy subroutine. Yet despite these apparent benefits, many .NET developer... (more)

Why 'LiveCD' Should Be a Part of Every Computer User's Vocabulary

Throughout the last decade, society has witnessed an explosion of network connectivity among PCs and mobile devices as well as a vast proliferation of networked applications, ranging from Web-based email to online banking. The end result of this is that network connectivity has become an almost indispensable resource for many individuals. Yet along with the convenience and flexibility of anytime, anywhere network access, society has also seen an increase in computer-related security and privacy concerns, with the most dreaded being the possibility of identity theft.  While numero... (more)

The Open Source Advantage in Secure Application Development

The security benefits and risks of Open Source code is one of the most debated topics in information security today. The views of proponents of the Open Source model are typified by Eric Raymond's argument that Open Source software is intrinsically more secure since its open nature lets a greater number of programmers view the source code and uncover potential security threats before they're released to the wild. Fewer people see closed source software, on the other hand, and so the odds of uncovering a potential security threat before a system cracker finds it is diminished. Op... (more)

Applicability of the .NET Platform to Bioinformatics Research

A current look at the field of bioinformatics will reveal that it is a field that is largely dominated by the Linux operating system, as well as by programming languages such as Perl, Python, and Java. Windows and its associated native application development platforms are not in widespread use among present-day bioinformatics practitioners. In fact, the usage of Linux and other open source technologies will likely remain the dominant platforms upon which most novel and/or large-scale bioinformatics research is conducted. Scientific computing of all types has deep-seated roots in... (more)