Geeks With Blogs
Blog Moved to http://podwysocki.codebetter.com/ Blog Moved to http://podwysocki.codebetter.com/ May 2006 Entries
C++/CLI Best Practices
Kenny Kerr has recently had an article published by the MSDN for best practices for C++/CLI. The link can be found here: http://msdn.microsoft.com/l... Overall it is a very thorough article on what you should and should not do when using C++/CLI. I found one interesting piece in here about the best practices dealing with the auto_handle versus using the delete keyword on a managed object. The auto_handle from what the link describes, is ......

Posted On Wednesday, May 31, 2006 2:32 PM

More Things Great .NET Developers Should Know
A few weeks ago, I linked to a list of What Great .NET Developers Should Know. I then came up with the idea of adding more of my own through my own experiences. I found this list to be helpful and not just random trivia and picking points out of the .NET class libraries. If anyone has more to add or to nitpick my list, please let me know... Updated 6/15/2006 See Questions BizTalk Developers Should Know as well for more questions Common Language Runtime Questions: Describe the inheritance differences ......

Posted On Wednesday, May 31, 2006 1:10 PM

Microsoft Developer Dinner Presentation - Atlas Wrapup
Last night, Robert Shelton and Marc Schweigert from Microsoft gave a very good presentation on the Atlas Framework. This event covered how Atlas can be extended not only to do server-side controls, but client-side Javascript as well. The client-side libraries can even be used in other scripting languages such as PHP which makes this even more interesting. The slide deck from last night's event is available here: http://www.federaldeveloper... ......

Posted On Wednesday, May 31, 2006 8:33 AM

Free Tool - Red-Gate SQLPrompt
I came across another tool to make my life easier. Red-Gate has released a product called SQLPrompt which provides Intellisense to your SQL. This is a free product (with registration) until September 1st, so hurry while supplies last. Let's go over briefly the features. This is a tray application that provides the Intellisenses to most major SQL Editors. It sits in the background and monitors when you have a .sql, .prc or other custom file extensions open. From there, it provides the Intellisense ......

Posted On Tuesday, May 30, 2006 2:30 PM

Reminder: Microsoft Developer Dinner - Overview of AJAX programming with Microsoft Atlas
Tonight, join the Microsoft Federal Developer Evangelist Team for an overview of AJAX (Asynchronous JavaScript and XML) and what it means. Microsoft is pushing heavily the ATLAS framework as a Microsoft version of AJAX. Come to the dinner and find out more. Here are the details: Overview of AJAX programming with Microsoft Atlas Tuesday, May 30, 2006 6:00 PM - Tuesday, May 30, 2006 8:00 PM Pacific Time (US & Canada) Welcome Time: Tuesday, May 30, 2006 5:30 PM Language: English-American Microsoft ......

Posted On Tuesday, May 30, 2006 11:51 AM

.NET Security - Understanding and Detecting Cooke Tampering
In previous posts, I talked about other security issues such as Cross Site Scripting (XSS), SQL Injection and other validation controls available to you for writing secure applications. Today is no different as we are talking about understanding and detetcing cookie tampering. What Is Cookie Tampering? Cookies can be manipulated quite easily as they are plain text files on your local machine. For example, say you have an application that stores your favorite color in a cookie. Once that data has ......

Posted On Tuesday, May 30, 2006 11:47 AM

Visual Studio Tools for Office 2005 Starter Kit: Requirements Authoring Starter Kit
Earlier this month, Microsoft released the Requirements Authoring Starter Kit (RASK) for Visual Studio 2005. It is available here: http://www.microsoft.com/do... RASK provides a customizable requirements-authoring solution for software development teams. It provides the basis for a Requirements Authoring solution and shows how to access Microsoft Visual Studio 2005 Team Foundation Server programmatically from Microsoft ......

Posted On Friday, May 26, 2006 12:30 PM

Day 7 of the Background Intelligent Transfer Service (BITS) Managed Wrapper
Update: Put a comment in if you want the C# version of this code and I will get it to you In previous days, I discussed the methods and properties to be implemented with the BITS wrapper BackgroundCopyJob. Let's go over some of them today. Let's start off with the IDisposable pattern which must be implemented when using these unmanaged objects. Here is the simple implementation required: // BackgroundCopyJob finalizer Podwysocki::Services::Backg... ......

Posted On Friday, May 26, 2006 12:01 PM

Capital Area MICSUG Meeting
The next user group meeting of the MICSUG will be held on THURSDAY, May 25 at 7:00 p.m. Geoff Snowman will be presenting: Integration - When to use What This will be a useful overview and comparison of the major Microsoft integration technologies, including: BizTalk, Workflow Foundation, WCF, MSMQ, SQL Integration Services, and others. Join us on THURSDAY, May 25 at 7:00 p.m. at the Microsoft Reston office http://groups.msn.com/MICSUG ......

Posted On Thursday, May 25, 2006 2:59 PM

.NET Code Access Security - Understanding and Preventing SQL Injection
In previous days I have talked about other ways to make your application secure. All of these lessons come down to a basic set of points: 1. Never trust user input 2. Use least privileged accounts What SQL Injection Is Today we will cover SQL injection, what it means and how to protect against this attack. SQL injection is a security vulnerability in an application that calls the database with SQL with unescaped characters which can lead to malicious data manipulation. This can be even more dangerous ......

Posted On Thursday, May 25, 2006 2:46 PM

Day 6 of the Background Intelligent Transfer Service (BITS) Managed Wrapper
UPDATE: See Day 9 of the Background Intelligent Transfer Service (BITS) Managed Wrapper for the source code plus binaries. In previous lessons, I covered the BackgroundCopyManager and how I wrapped the IBackgroundCopyManager in Managed C++. Today, I'll go a step further to look at the BackgroundCopyJob wrapped class. The BackgroundCopyJob wraps the following interfaces: * IBackgroundCopyJob * IBackgroundCopyJob2 * IBackgroundCopyJob3 As we are dealing with unmanaged types, we must also take into ......

Posted On Wednesday, May 24, 2006 6:47 PM

.NET Code Access Security - Regular Expression Input Validation
In a previous lesson, I talked about preventing Cross-Site Scripting (XSS) as part of a security strategy. Today, I will cover another topic in the security strategy and implementation. I also want to talk about basic validations and where they should be done. As a secure programmer and architect, you should realize that data validation needs to be done at every layer. The .NET framework provides us with many tools for us to accomplish that goal. We do not want to assume since the user interface ......

Posted On Wednesday, May 24, 2006 1:14 PM

.NET Code Access Security - SecureString
With many secure applications, we must be cognizant of the memory usage and the secure storage of our data. In the C++ world, there have been functions specifically defined to secure memory, such as SecureZeroMemory iin Winbase.h. For example, we can use the SecureZeroMemory function to place zeros over the memory for a user name and password once we are finished with them. Here is an example of how to do this: http://msdn.microsoft.com/l... ......

Posted On Tuesday, May 23, 2006 3:22 PM

Capital Area .NET User Group Meeting
Just as a reminder, tonight there is a Capital Area .NET User Group meeting at 7PM. Details are located here: Tuesday, May 23, 2006 (EST) - Developing Integration Solutions using BizTalk Serspeaker: Geoff Snowman and Lamont Harringtonlocation: AT&T Building, 1900 Gallows Road, Tysons CornerCome learn how to employ BizTalk to tie applications together. Lamont Harrington is a Technology Architect with Microsoft Corporation and works out of the Reston, VA -based Microsoft Technology Center. He focuses ......

Posted On Tuesday, May 23, 2006 1:04 PM

Microsoft Developer Dinner - Overview of AJAX programming with Microsoft Atlas
On May 30th, join the Microsoft Federal Developer Evangelist Team for an overview of AJAX (Asynchronous JavaScript and XML) and what it means. Microsoft is pushing heavily the ATLAS framework as a Microsoft version of AJAX. Come to the dinner and find out more. Here are the details: Overview of AJAX programming with Microsoft Atlas Tuesday, May 30, 2006 6:00 PM - Tuesday, May 30, 2006 8:00 PM Pacific Time (US & Canada) Welcome Time: Tuesday, May 30, 2006 5:30 PM Language: English-American Microsoft ......

Posted On Tuesday, May 23, 2006 11:10 AM

Free tools - Simian and Code Refactoring
Code refactoring is a very important concept to learn when dealing with Object Oriented design patterns. Luckily, Visual Studio 2005 gives us the ability to refactor code quite easily with just a simple highlight and right-click. More information about code refactoring can be found here: http://msdn.microsoft.com/l... Anyhow, we need an easy way to find duplicate code worth refactoring. RedHill Consulting created the Simian tool to detect ......

Posted On Monday, May 22, 2006 12:54 PM

.NET Security - Exception Management
In previous days, I talked about many other ways to write a secure application. Today I will cover exception management and handling as it pertains to application security. When dealing with Exceptions, it's a best practice to hide the implementation details of your applications from the user. This includes hiding information regarding implementation, any secure data, and system configuration. To provide a secure application with regards to exception handling: * Use a structured exception handling ......

Posted On Monday, May 22, 2006 11:10 AM

.NET Code Access Security - Class Design Considerations
As secure developers, we must take into account our class designs. We need to reduce the attack surface available to potential to attackers. We can do this by limiting inheritance, and limit users or groups or even code that can call the secure code. Today we will concentrate on five major topics: * Limit class or member visibility * Seal non-base classes * Restrict callers of your code * Restrict inheritance with keys * Limit the set modifier on properties Limit class or member visitbility When ......

Posted On Saturday, May 20, 2006 8:17 PM

Free SharePoint Tools - CAML Builder
In some of my SharePoint experience, I have had some cases in which CAML is necessary. So, I scoured the web looking for references when CAML Builder from U2U was pointed to me. The tool is quite easy to use, as I will show you down below. First off, let's go through the login screen. You must specify at this point the URL of the SharePoint instance you wish to connect. For this example, I will be looking at the personal site of TestUser. You also have the option of connecting to the SharePoint instance ......

Posted On Friday, May 19, 2006 3:34 PM

Understanding and Preventing Cross-Site Scripting
One of the many purposes of this blog is to stay up to date with .NET security features. One of the security topics that I'm going to cover today is Cross-Site Scripting (XSS) attacks. First off, let's understand what XSS attacks are. XSS attacks exploit vulnerabilities in Web-based input validation by injecting client side scripting, such as Javascript (JS) or Visual Basic Script (VBS). Once the script has been sent to the server, the data is stored and then sent back to the user. These attacks ......

Posted On Thursday, May 18, 2006 3:42 PM

What All Great .NET Developers Should Know
I found Scott Hanselman's post "What Great .NET Developers Ought to Know" just a little bit ago and it really is one of the best comprehensive lists of interview questions out there. Over time as I've interviewed people for positions within the current company, I always found a good checklist for what makes a good OO programmer but didn't have the definitive .NET list. This list is pretty much a must to know! Update: See This post for my own set of questions that I like to ask as well as my latest ......

Posted On Thursday, May 18, 2006 11:35 AM

Will making Java Open-Source Change the Landscape?
It was announced today that Sun Microsystems is set to make Java Open Source. This of course follows the trend in recent times of releasing the source code to some applications. My question is, will this change the landscape with Java adoption? Source: http://news.yahoo.com/s/nf/... ......

Posted On Wednesday, May 17, 2006 2:38 PM

AJAX and Section 508 Compliance
As technologies rise in popularity, we must always be sure that our web applications comply with Section 508. AJAX is no different at this point. Many people have pointed out that you must take special considerations when implementing this technology. There are two articles worth checking out in that regard. The first post on ajaxian.com, there is a group discussion on what exactly makes AJAX compliant. The link for the article is here: http://ajaxian.com/archives... ......

Posted On Wednesday, May 17, 2006 2:22 PM

C++/CLI and XML Code Documentation
Finally, in Visual Studio 2005, Microsoft now supports XML Code Documentation. Visual Studio now ships with XDCMake.exe which creates XML Documentation files that we so enjoyed back in C#. Let's take a further look on how to use it. First off, I created a new C++ CLR library in Visual Studio called AuditingLibrary. Once the project has been created, right-click on the project and go to the properties page. Notice on the left hand tree, that there is a XML Document Generator element. Expand that element ......

Posted On Wednesday, May 17, 2006 11:23 AM

Defending your code - Wiki style
Although the site isn't quite complete, a wiki for security coding practices are long overdue.  The site http://www.defendingyourcode.com shows some promise to not only teach the community about security, but also let others contribute to security best practices and code snippets.
 
Stay tuned and hopefully this site will take off!

Posted On Tuesday, May 16, 2006 7:11 PM

Microsoft Application Threat Modeling - Security Workshop Wrapup
It was a great workshop held at Microsoft in DC today by Talhah Mir from the Application Consulting and Engineering (ACE) Team. We covered such topics as threat modeling, code security, attacks and countermeasures as well as lots of other topics. First off, let's talk a little about the ACE Team at Microsoft. The ACE Team is responsible for application performance, security, and privacy engineering at Microsoft. They have their blog at this location which is well worth checking out: http://blogs.msdn.com/ace_t... ......

Posted On Tuesday, May 16, 2006 7:02 PM

Day 5 of the Background Intelligent Transfer Service (BITS) Managed Wrapper
Update: Put a comment in if you want the C# version of this code and I will get it to you Sorry about the delay about getting back to this, but I have been rebuilding a clean build environment for this tool for both Visual Studio 2003 and Visual Studio 2005 which required a little bit of work. I'm in the process of getting some sort of hosting so that I can share the source code, but if you need or want it in the mean time, please do not hesitate to contact me. Anyhow, we left off with the total ......

Posted On Monday, May 15, 2006 3:08 PM

ASP.NET 2.0 Custom Membership Providers
Last week, I was studying for 70-528 TS: Microsoft .NET Framework 2.0 - Web-Based Client Development at the local study group, I came across the out of the box Membership Providers. Currently, there are two Membership Providers out of the box with ASP.NET 2.0, the SqlMemberProvider and the ActiveDirectoryMembership Provider. On the MSDN, Microsoft has released the Provider Toolkit for ASP.NET 2.0. As we dig further, we see there is a link for Membership Providers which has an example of how to create ......

Posted On Monday, May 15, 2006 12:57 PM

C# 3.0 - First look at LINQ and implicit types
In the first look I posted last week, I asked the question why the var keyword for implicit types were so powerful and more than just syntactic sugar. After a response, I then realized I overlooked something pretty obvious with regards to LINQ queries. I found this post from Cyrus' Blather to be quite helpful: http://blogs.msdn.com/cyrus... Let's just go over the details for my own piece of mind. Let's compare how we would do each query in .NET 1.1, 2.0 and now 3.0. First, ......

Posted On Monday, May 15, 2006 12:06 PM

.NET Code Access Security - ZoneIdentityPermission
In previous posts, I've talked about SqlClient permissions, Visual Studio 2005 improvements, strong names among other things. Today, we're going look at some of the ways to secure a web application. So, let's bring ZoneIdentityPermission and ZoneIdentityPermissionAttri... into the picture. This class allows the developer, through code, to specify the zone in which this code can be called. This mechanism for determining the location of the calling code is through Internet Explorer Zones. In the SecurityZone ......

Posted On Monday, May 15, 2006 10:47 AM

Reminder - Developer Security Training - May 16th
Microsoft is holding developer security training on May 16th at the Washington DC office. This class takes Microsoft security best practices and makes them applicable to the enterprise. The details of the event are: Developer Security Training - Washington, DC Tuesday, May 16, 2006 9:00 AM - Tuesday, May 16, 2006 5:00 PM (GMT-05:00) Eastern Time (US & Canada) Welcome Time: 8:30 AM Language: English-American Microsoft Washington, DC Facility Potomac5335 Wisconsin Ave. NW Suite 600Washington District ......

Posted On Monday, May 15, 2006 8:18 AM

BizTalk Resources
I went over to Geoff Snowman's blog this morning for some BizTalk goodies and sure enough I hit the jackpot. Geoff is the leader of the local Capital Area Microsoft Integration and Connected Systems User Group (MICSUG). Anyhow, his site has lots of goodies, especially from his January 15th post at: http://blogs.msdn.com/gsnow... BizTalk resources: The product site: http://www.microsoft.com/bi... The developer center: http://msdn.microsoft.com/b... ......

Posted On Monday, May 15, 2006 8:17 AM

Windows Communication Foundation Labs
After attending the MSDN event in Washington, DC for not only the morning session, but also the afternoon session, I decided to give the MSDN Virtual labs for the Windows Communication Workflow.  They can be found here:  http://msdn.microsoft.com/virtuallabs/wcf/
 
Once you are there, look around for other great virtual labs.

Posted On Friday, May 12, 2006 3:09 PM

C# 3.0, First Thoughts
Since I like to stay ahead of the curve when it comes to new technologies, I came across the C# 3.0 specification recently and thought it was quite interesting. I obtained the overall specification from Microsoft as a word document here: http://download.microsoft.c... Anders Heljsberg gave a presentation about the new specification on the MSDN Channel 9 which can be found here: http://channel9.msdn.com/Sh... ......

Posted On Friday, May 12, 2006 2:56 PM

.NET Code Access Security - SqlClient
In previous posts, I covered what you can do with strong names and the new features in Visual Studio 2005. My perspective regarding security is that it is way overlooked with our programming and needs to be reinforced in all day to day operations. Today, what we're going to cover is the SqlClientPermission and the SqlClientPermissionAttribute. We can use this attribute to restrict how the database can be accessed. I'm always of the mindset is to restrict most permissions unless specifically granted ......

Posted On Friday, May 12, 2006 9:53 AM

.NET Code Access Security for fun and profit - Strong Names
In the previous lesson, we covered the new functionality provided by the security user interface. Today, let's look at strong naming and how you can use it. I'm sure most people by now know about strong names and what they are. If not, here is the best explanation link I have: http://www.codeproject.com/... Basically what the strong name key can give us is cryptographically strong evidence for evaluation. In this case what we're going to do is use the strong name to restrict ......

Posted On Wednesday, May 10, 2006 2:16 PM

Day 4 of the Background Intelligent Transfer Service (BITS) Managed Wrapper
UPDATE: See Day 9 of the Background Intelligent Transfer Service (BITS) Managed Wrapper for the source code plus binaries. In previous lessons, I laid out the basic API for BITS. Now I think it's time for us to start doing the actual planning on how to wrap this API. Let's start by mapping out the BITS types and then creating our own wrapped types. Below, I have a table of those native types and what the wrapped types will be: Enumerations Unmanaged BITS Type Wrapped Type BG_AUTH_SCHEME AuthenticationScheme ......

Posted On Wednesday, May 10, 2006 7:37 AM

Day 3 of the Background Intelligent Transfer Service (BITS) Managed Wrapper
Update: Put a comment in if you want the C# version of this code and I will get it to you In the previous lesson, I left off with the basic understanding of the IBackgroundCopyManager. Today, we're going to dive a little deeper into what exactly the IBackgroundCopyManager creates, the IBackgroundCopyJob. There are many methods in the IBackgroundCopyJob and so much so that it's really difficult to talk about each one in detail. As the versions of BITS evolved, more interfaces were added to support ......

Posted On Wednesday, May 10, 2006 7:34 AM

Day 2 of the Background Intelligent Transfer Service (BITS) Managed Wrapper
Update: Put a comment in if you want the C# version of this code and I will get it to you In my previous lesson, I gave a brief overview of the Background Intelligent Transfer Service. Today we will dig a bit deeper into some of the API as well as give reasons why I chose Managed C++ over a C# implementation. First off, there was plenty of reading to do from the last time. If you want to read more about the uses of BITS as well as the key technologies behind it, please check out this link: http://msdn.microsoft.com/l... ......

Posted On Wednesday, May 10, 2006 7:33 AM

Seven Reasons Web Apps Fail
Joshua Porter looks at why web apps fail and give seven really good reasons. It is well worth a read at: http://bokardo.com/archives... Here are the major points as well as how to deal with them: Focus on social instead of personal - Focus on user needs Trying to solve too many problems with one application - Deal with scope They’re about making someone other than the user happy - Identify customers They sell it the wrong way - Focus on what the product can do instead of ......

Posted On Tuesday, May 9, 2006 8:33 PM

SharePoint - Creating a custom document library through ListTemplates
I am currently on a rather large SharePoint implementation and over time I have gathered a lot of tips and tricks for SharePoint. Quite frankly, if you took any XML configuration files from SharePoint and really dissected it, it would take weeks to fully understand what each does. Today, I am writing about how to create a custom document library through the ListTemplate and such. In my example, we will create a custom document library to store resumes from the standard document library on the personal ......

Posted On Tuesday, May 9, 2006 4:15 PM

Day 1 of the Background Intelligent Transfer Service (BITS) Managed Wrapper
Update: Put a comment in if you want the C# version of this code and I will get it to you A large client of mine wanted an automated way of delivery large files picture files throughout their network. After listening to their initial solution of FTP, I realized after some research that the Background Intelligent Transfer Service (BITS) would be a good alternative. I could programatically use BITS to transfer files automatically to the other computer using upload job types. BITS has an advantage over ......

Posted On Tuesday, May 9, 2006 12:47 PM

.NET Code Access Security for fun and profit Part II
As I left off last time, I gave a few examples of how to enforce identity security checks via your code. Now, let's look into the changes for Visual Studio 2005. This has quite a few advantages over Visual Studio 2003 in terms of having a user interface for specifying basic security attributes. First off, below is what you would expect when you click on the project properties and browse to the security tab on the left hand side menu. From here, you have the ability to set whether your project has ......

Posted On Tuesday, May 9, 2006 11:44 AM

.NET Code Access Security for fun and profit
In my coding, I've always been careful about which operations are permitted and which are not. I took a lot of lessons learned when I studied for and passed 70-340 Implementing Security for Applications with Microsoft Visual C# .NET. Anyhow, I want to run through a few examples of what I have been doing as a best practice. As I go along in time, I'll run through more useful examples and how they apply to the enterprise. Believe me, in the world today, companies are becoming increasingly interested ......

Posted On Monday, May 8, 2006 3:10 PM

Studying for the MCPD
I recently joined the ViennaMCSD group which is studying for the MCPD. I got my MCSD a year ago and now in the process of studying to upgrade it. I think this is a pretty worthwhile group if you are interested in studying for the certification in a group setting. In the future, I should probably look to upgrade my MCDBA as well and even look at the new BizTalk certifications. I see that they still don't have any SharePoint exams at this juncture which I think it interesting ......

Posted On Monday, May 8, 2006 8:28 AM

Developer Security Training - May 16th
Microsoft is holding developer security training on May 16th at the Washington DC office. This class takes Microsoft security best practices and makes them applicable to the enterprise. The details of the event are: Developer Security Training - Washington, DC Tuesday, May 16, 2006 9:00 AM - Tuesday, May 16, 2006 5:00 PM (GMT-05:00) Eastern Time (US & Canada) Welcome Time: 8:30 AM Language: English-American Microsoft Washington, DC Facility Potomac5335 Wisconsin Ave. NW Suite 600Washington District ......

Posted On Monday, May 8, 2006 7:48 AM

Upgrading from Managed C++ to C++/CLI
I'm sure there are plenty of people still working in the .NET 1.1 world with Managed C++ who haven't quite moved to C++/CLI. I'm finally taking some of my legacy applications that I have written and porting them over to C++/CLI. Unfortunately, the conversion process wasn't very smooth, as I had a lot of unresolved externals once I tried to compile the application. Microsoft has published a migration guide in order to bring your code "up to date" and gives a checklist that you must follow which is ......

Posted On Friday, May 5, 2006 10:04 AM

Passed MCP Exam 70-301
After postponing the exam for so many months, I've decided to finally take the 70-301 Managing, Organizing, and Delivering IT Projects by Using Microsoft Solutions Framework 3.0 exam. Being that I have a background in process and CMMI, I found this exam not to be too hard, but more of common sense when it comes to the project management and risk management areas. I found the best way to pass is to study the following areas: Foundation Principles of MSF (Open communication, shared vision, empowerment, ......

Posted On Thursday, May 4, 2006 5:00 PM

Will Linux Ever Be a True Desktop OS?
In Rob Enderle's latest latest column, he discusses why he believes that Linux will not overtake Windows as a true desktop operating system. There are a few paragraphs worth glossing over in here that I find particularly interesting. "Windows is free to the OEMs. In fact, not only is it free, but Microsoft, in effect, pays them to take it. Regardless of the cost, Windows is a logical choice, and a straight pass. Dell (Nasdaq: DELL) Latest News about Dell pays about $80 for it and typically charges ......

Posted On Thursday, May 4, 2006 4:58 PM

Free Tool - Process Explorer
Lately, I have been doing rather large data migration to and from SharePoint Portal Server 2003 using the API and was running into performance issues (Not a surprise really). Anyhow, I needed to find out some basic information about memory usage as well as some of the .NET related information. I found the solution with Process Explorer, written by Mark Russinovich. The tool is available via this link: http://www.sysinternals.com... When you first launch the application, ......

Posted On Thursday, May 4, 2006 4:58 PM

An Introduction to Model Driven Architecture
Just before I head out for the week, I thought I'd touch base on one topic near and dear to my enterprise architecture heart. In the following weeks, I will dive into enterprise architecture and especially Model Driven Architecture (MDA). The official site contains a pretty good executive summary on what it means and can be read here: http://www.omg.org/mda/exec... When I get a chance I will discuss more about this subject ......

Posted On Thursday, May 4, 2006 4:57 PM

Free SharePoint Tool of the Week - InstallAssemblies
While working on a large SharePoint deployment for a major corporation, I came across many interesting tools to make my life easier. During the development process, I found it to be a hassle to deploy WebParts to the server over and over again, going through those many steps. During my searching for tools, I discovered InstallAssemblies which is a wonderful tool to allow the easy deployment of WebPart libraries to a SharePoint server. The tool can be found as part of the Web Part Toolkit: http://www.bluedoglimited.c... ......

Posted On Thursday, May 4, 2006 4:54 PM

Free testing tools - WebServiceStudio 2.0
Update: Now moved here: http://www.codeplex.com/wss... At one point or another, we've had the need to test our web services and WSDLs. When I was on a BizTalk integration project, I had the need to test the orchestrations exposed via Web Services easily without jumping through all the code. This WebServicesStudio 2.0 tool allows you to test web services with ease and solves a lot of problems. The product is available here: http://www.codeplex.com/wss... Like most tools, I like to ......

Posted On Thursday, May 4, 2006 4:51 PM

Why isn't Vista built on .NET technologies?
This article by Gary McGraw, CTO of Cigital Inc, wrote an article saying how Microsoft missed an opportunity with moving Vista to .NET. Very much worth reading here: http://darkreading.com/docu... This paragraph definitely caught my eye: The problem, it turns out, is that the .NET builders did not give much thought to providing many of the essential basic building blocks that operating systems construction crews need for their work. Interpreted code has some minor performance issues ......

Posted On Thursday, May 4, 2006 4:50 PM

Upcoming Code Camp - June 10th
I will be attending the upcoming Reston Code Camp on June 10, 2005. Here are the details: Saturday, June 10, 2006 9:00 AM - Saturday, June 10, 2006 7:00 PM (GMT-05:00) Eastern Time (US & Canada) Language: English-American Microsoft Conference Center - MTC Reston 12012 Sunset Hills Rd Reston Virginia 20190United States The link for registration for this event is here: http://msevents.microsoft.c... It's well worth checking out and a shame ......

Posted On Thursday, May 4, 2006 4:48 PM

Managed C++ and IDisposable
Lately, I've been working with a lot of Managed C++ and creating a managed wrapper for the Background Intelligent Information Service (BITS). As time goes along, I will get deeper into the code, but for now I'll just cover the little topics as they come up. As always I run FX Cop, which is available here http://www.gotdotnet.com/te... to validate my coding. I ran across the rule "ImplementIDisposableCorrec... Unfortunately, when I click on the link to check for resolution for my problem, ......

Posted On Thursday, May 4, 2006 9:54 AM

Free Tool - Altiris Software Virtualization Solution (SVS)
We all should know by now about the great things we can do with virtual machines, whether they be Microsoft Virtual PC, Microsoft Virtual Server, or VMWare. These tools are great for loading development environments as well as trying out new beta products and throwing them away or rolling back if the machine should be harmed during the process. But, until now, have we really looked at doing this virtualization at the software level instead of the operating system? The Altiris Software Virtualization ......

Posted On Thursday, May 4, 2006 9:34 AM

OLE DB Provider for Directory Services
When I was helping out a coworker with an issue for data mining for a logging and auditing ISAPI tool that we created (don't worry I'll get to the basic concepts of what we did), we realized we needed an easy way to pull information from AD easily during our data loads. SQL Server makes this easy of course with the OLE DB Provider for Directory Services. Information about this can be found here: http://msdn2.microsoft.com/... for SQL Server 2005. The reference from ADO 2.8 ......

Posted On Wednesday, May 3, 2006 8:56 PM

Upcoming Microsoft Events
There are a couple of upcoming events worth checking out in the Washington, D.C. area and to a city near you as well. First off, we have the ISV Touchdown Briefings, which is a half day event that discusses Windows Presentation Foundation (WPF) and Windows Communication Foundation (WCF). This event runs from 8AM - 12PM and leaves half the day for another presentation. Windows Presentation Foundation, formerly called "Avalon", provides the basis for creating rich applications in Longhorn. This includes ......

Posted On Wednesday, May 3, 2006 8:53 PM

Copyright © Matthew Podwysocki | Powered by: GeeksWithBlogs.net | Join free