Web Farms: Use Data Caching Techniques to Boost Performance and Ensure...
In this article the author describes data caching in a Web farm environment and discusses how to avoid the cross-server synchronization problems inherent in this approach.
View ArticleMitigate Security Risks by Minimizing the Code You Expose to Untrusted Users
This article discusses: Identifying and reducing attack surface, Reducing the amount of code executing by default, Reducing the volume of code accessible to untrusted users and Limiting damage if...
View ArticleSimplify App Deployment with ClickOnce and Registration-Free COM
This article discusses: The benefits of Reg-Free COM. How to isolate existing COM components and ActiveX controls using Visual Studio 2005. The limitations of Reg-Free COM.
View ArticleDrill Into .NET Framework Internals to See How the CLR Creates Runtime Objects
This article discusses SystemDomain, SharedDomain, and DefaultDomain; Object layout and other memory specifics; Method table layout and Method dispatching
View ArticleMSDN Webcast: Load and Web Testing with Microsoft Visual Studio 2005 Team System
By using Microsoft Visual Studio 2005 Team System as a platform, you can better manage the software development life cycle. You have the flexibility to customize and extend this platform to meet...
View ArticleMSDN Webcast: Extending the Web Content Management Features of Office...
Find out how to extend the Web content management authoring and rendering features in Microsoft Office SharePoint Server 2007. Topics we cover in this webcast include extensions to the navigation...
View Article8 Simple Rules For Developing More Secure Code
This article discusses: Using analysis tools and experts to review your code; Reducing risk using fuzzing and threat modeling; Keeping bad input out of your applications; and Learning all you can about...
View ArticleDocumenting And Evaluating The Security Guarantees Of Your Apps
This article discusses: Analyzing the security of application features; A deeper look at security requirements; A top-down security design extension to SDL; and Disclosing details to users and experts.
View ArticleInside Diagnostic Tools for .NET
Many diagnostic tools use the CLR Profiling API-even those that aren't strictly profilers. So if you've ever wondered how these tools work, a look at the Profiling API is a good start. In this column,...
View ArticleTeam Foundation Server Version Control
Visual Studio Team System provides extensibility options for almost every area of the product, and the Version Control service is a shining example. Using the rich APIs, we create a simple add-in that...
View ArticleValidating ASP.NET Query Strings
Recent statistics show that cross-site scripting (XSS) attacks are gaining momentum and they claim the lion's share of discovered attacks. Successful XSS attacks are always due to unvalidated or...
View ArticleInfrastructure Architecture
An introduction to a new branch of architecture that is urgently needed to support modern organizations, and needed to help architecture to mature as a whole.
View ArticleStrengthen Access Control with Enterprise Identity Management Architecture
Without robust identity management, we can never be confident of our security.
View ArticleMurphy�s Law Manifests on Manic Monday
The Information Technology Infrastructure Library (ITIL) is an integrated series of best practices in IT service management that conform to the British Standards Institution standard (BS15000), with...
View ArticleArchitecture Journal Profile: Don Ferguson
Dr. Donald Ferguson is a Microsoft Technical Fellow in Platforms and Strategy in the Office of the CTO. Don focuses on both the evolutionary and revolutionary role of information technology in...
View Article"Are We There Yet?" Estimation and Tracking on the Road to Software...
Cost estimation and tracking are two very important elements in software development and implementation, but the relationship between them is even more important.
View ArticleSoftware-Engineering Asset Management
When users ask for what they need, it's not enough to tell them what you have. When someone looks for the answer to a problem, users will (hopefully) understand what the problem is, but probably will...
View ArticleARCast.TV: Training - Architect as Advocate
Have you ever been in trouble with the law? I hope not, but if you ever were arrested in the US they would tell you that you have "...the right to remain silent" and "...You have the right to speak to...
View ArticleThe Infrastructure Landscape: A Matter of Perspective
This article offers a quick exploration of an infrastructure-architecture model that really works.
View Article
More Pages to Explore .....