Geeks With Blogs
Jim Kita's MS Architecture Blog Best Practices in Enterprise Application Architecture from an MS perspective.
Pardon me if this is a “duh” topic, but it was new to me and so may be new to other developers too, so… The registry has changed under Windows 64 presumably starting from Windows Server 2003 64 bit and Windows XP 64 bit. As a result, there is a different view of the registry for 64 bit applications and 32 bit applications. According to the documentation: ......

PTPT and if you say it just right it comes out petit petit (petit the French word for small). But the Petit Petit touch screen user interface out of Germany will have no small impact on computing. This blog is not at all about User Experience because there are much better sources for that type of content. But having said that, application architecture ......

As an update to my earlier blog entry, I noticed this afternoon that Microsoft has opened the Pivot project to public beta. It is a rich client application and as such, it requires a client side download and install. The hardware/software requirements are very steep too, so make a note of that if you are seriously considering this tool. It is, though, ......

More precisely, users will do things to your application that you never expected or intended. But for the most part these users are not evil. There are, though, a small subset of users who are actively attempting to corrupt your Web application and they will more likely than not find a way to do so. A blog over at SANS points this out: Client Side Input ......

For as long as it has been available, I have recommended the Microsoft Anti-Cross Site Scripting Library for internet development because it is a valuable tool to assist developers mitigate one class of common security threats. As important as this tool is, I was always a bit disappointed that it only went part way in handling the wide variety of threats ......

So I am looking at the calendar on my desk and it is telling me it is 01/11/10. This number fascinated me because it is a palindrome meaning it is the same backwards and forwards. After staring at it a bit more, I realized it was composed of only 1s and 0s which means it could also be construed as a binary representation. So I wish you all a very happy ......

Within the world of Business Intelligence and Analytics, data analysis can only be automated so far and manual analysis is often required to add an important component of human intelligence. To that end, data visualization is a useful, if not critical tool to be able to absorb and understand large amounts of data. So it came as a bit of a surprise that ......

Are you using the Microsoft AJAX framework with your ASP.NET application and are worried about the cost to maintain and serve up the javascript library components along side your application code? Well Microsoft just introduced the Microsoft AJAX Content Delivery Network. They host, mantain and serve the AJAX javascript library on their servers and ......

As a follow up to my blog post from yesterday, I noticed that the Internet security vendor Websense also released a report on the state of Internet security [PDF] that largely confirms the SANS report discussed previously. The two take-away quotes that I found most interesting were: “61 percent of the top 100 sites either hosted malicious content or ......

There are glimmers of good news to be found in the newly published SANS report on The Top Cyber Security Risks which is an exhaustive survey of attack data collected from the intrusion prevention systems of over 6000 organizations. But the report reveals how gaps in organizational security policies lead directly to an avalanche of critical weaknesses ......

Copyright © Jim Kita | Powered by: GeeksWithBlogs.net | Join free