Page 1 of 180
LINQ to SQL in multi layered + service apps
writes "....this is by no means the only way to achieve the goal of using LINQ to SQL in a multi layered application. It’s just simple and easy. Feel free to comment and share your findings and thoughts....Referencing the DAL objects from the presentation layer is bad because you’re creating a strong bond between these layers that are supposed to be decoupled. The rule states that the presentation layer must not be aware of the data access layer. What you really need to do is create a transport object layer that will be referenced by the BAL and the DAL. These objects are just plain POCOs..."
Windows Explorer Has a New Preview Pane
writes "....you may not be aware that Windows Explorer also has its own Preview Pane that extends beyond the live icons you may have noticed when navigating folders in Windows Explorer. Different than Windows XP's individual menus, toolbars, Navigation Pane and Task Panes, Windows Vista has merged them all into a single interface -- take a look:"
Some Applications Sluggish after Security Update
writes "After installing Security Update KB928365 for the Microsoft .NET Framework 2.0 to fix MS07-040, some users are noticing some managed applications - especially those developed using the Windows Presentation Framework (WPF) - are running sluggish. The apparent problem is that native images"
Reusing the SMS GUID in a New Computer deployment
writes "When performing a refresh based deployment using Zero Touch BDD will retain the computers current SMS GUID. This is very handy if you want to rebuild a computer but not lose any information associated with the computer SMS....This also has the effect of reducing the number of duplicate records in SMS.....So that's how it done. Hopefully you will find this process useful, I certainly do."
Still Very Much Alive and Kicking - netsh
writes "netsh.exe is a nifty little command-line utility that is part of each and every copy of Windows since Windows 2000. It supports configuration of core networking parameters such as settings for TCP/IP, Windows firewall, network access protection (NAP), winhttp and IPSec....As the configuration of the majority of Windows Server 2008 Core settings typically gets executed on the command-line, netsh will once again play a pivotal role on this optimized platform..."
Sticky Sessions aka Affinitization in the Load Balancer
writes "How can I use reliable messaging together with a load balancer?"
Determining Whether Tests Passed in Team Build Orcas
writes "....last year I described how to use a custom task to determine whether tests had passed in Team Build v1. In Team Build Orcas, you should be able to accomplish this same goal using the new built-in task GetBuildProperties. The following XML snippet in your build script (TfsBuild.proj) should do the trick:"
SQL and the wizard of AWE
writes "....let's talk about something that can be one of the first things that will bring improvement to most Any SQL Server install....you have to enable AWE, or Address Windows Extensions. AWE enables a 32-bit program, via the OS, to allocate more than the default max of 2 GB for a given process in memory. So adding more RAM, and then enabling AWE, will increase your page life expectancy...."
Malware Protection Center - Threat Research/Response
writes "This is an excellent resource for Microsoft Security information...."
Microsoft to offer code protection, validation to other software developers
Mary Jo Foley
writes "Microsoft is planning to deliver on October 1 to third-party software developers a set of technologies that will allow them to add code protection and activation mechanisms to their own software. When Microsoft first unveiled its “Genuine Software” initiative three years ago, company officials said they planned to license to third parties some of the same anti-piracy technologies that Microsoft was baking into Windows and Office. Instead, Microsoft has decided to provide external developers with a separate, parallel offering,"
Advanced Metadata Service Scenarios
writes "If you want to create real dynamic applications not relying on the WSDL you get at compile time, you have to use both the DynamicEntity class and the metadata service....This gives you a list of the attributes you have to specify....However the above does not include the attributes that are marked as business required. So here’s the same to get a list of attributes that “should” be set:"
Failure to Think Big
writes "....to develop audio and visual web-based training for our clinical staff. In theory it sounds good. It is only now that people are realizing that the concerns raised by the IT staff when we were selecting the vendor are valid. Our e-learning provider did not consider the impact of their application on our network infrastructure...."
July 2007 Security Updates - note the MS07-040 issue
writes "....recently released important updates for this month which should be applied promptly. Some spotty issues have surfaced with MS07-040 as noted in the last link:"
Command Lines for Exchange 2007
writes "The following command line will provide you with a list of the Exchange 2007 send connector max send sizes....set the Exchange 2007 send connector settings....list of the Exchange 2007 receive connector max send sizes....set the Exchange 2007 receive connector settings...."
The bad guys will use BitLocket too
writes "....about how BitLocker will affect the ability of law enforcement to conduct forensic analysis of a protected hard drive. Specifically....any back doors that law enforcement could use to bypass the encryption. The answer is very simple....there are no back doors. Period. Think about it for a moment: if there were a back door"
Find out the Latest on Windows Mobile 6 Security
writes "The latest edition of Technet Online has a great article on Windows Mobile 6 Security...."
Know what Privileges are Built into Vista Ultimate x86
writes "Windows ships with a large number of processes built-in....iit is highly interesting to know what privileges these processes have, what accounts they have in their tokens, and what the access control list (ACL) on the process itself is. This document summarizes these parameters for a stand-alone Windows Vista Ultimate x86 system with all optional components installed."
dcpromo Changes II In WIndows Server 2008
writes "Following a required system restart after the successful run of dcpromo, you will notice that there are 2 new server roles installed on the domain controller, both mapping to Active Directory Domain Services and DNS Server as part of the dcpromo setup process."
How to Retrieve TFS SMTP Server Name
writes "You can associate Team Foundation Server with a SMTP mail server. You can do this during the initial install, or you can modify the TFS web.config at a later date. This allows you to have Team Foundation Server email project alerts out to subscribed users. Let's say I want to write some custom code to send some emails...."
How to Integrate Mass Storage Drivers into your XP image
writes "....these must be integrated when the client is syspreped. You cannot add drivers to an image after it has been created. (This is a limitation of XP that is now solved with Vista).The rest of this post will detail how to integrate the Intel mass storage drivers into your image....Once you have performed all of these tasks you must rebuild your image then sysprep and capture it. This is a bit of a hassle I know, but there is another solution, use Vista!"
Page 1 of 180