Archives
-
Six New Microsoft MVPs
Six new Microsoft MVP titles had been given to community contributers from Israel today :
-
Override CLR Assembly Probing Logic
Junfeng Zhang just blogged about Override CLR Assembly Probing Logic, its good to finally find some documention about it.
-
Microsoft EMEA 2006 Connect
I’ve returned last Thursday from Microsoft EMEA 2006 Connect event held this year at the Four Seasons Resort in Provence.
-
Software Factories Seminar
Microsoft Israel hosted today a Software Factories Seminar by Beat Schwegler & Ingo Rammer, during the seminar Ingo demonstrated a cool DSL for managing the UIP Application Block and helping in defining the horrible xml configuration of the UIP using DSL state charts. The talk also featured the Guidance Automation Toolkit which it indeed a cool tool.
-
Installing Vista Feb CTP inside VMWare
It took me four times to fail installing Vista inside VMWare till I figured out that I should google for the answer…
-
A First Look at InfoCard
Do you want to learn about the new identity metasystem – InfoCard ?
-
WMI Diagnostics
WMIDiag.vbs is a VBScript script designed to help you ascertain the current state of the WMI service on a computer. The download package includes the utility itself, a ReadMe file that discusses how the tool works (and how to best use it), and sample spreadsheets that provide information about the default WMI configuration on various versions of the Microsoft Windows operating system.
-
Intellisense support for WCF configuration files - February CTP
Juval Lowy has posted an updated version of the WCF configuration schema here.
-
And let the search war begin !
Windows Live Search is up… and finally Microsoft Search engine is looking good !
-
Building secured applications with Oracle & .Net
Yesterday’s evening I gave a talk at the first meeting of the Israel Oracle .Net Forum, the talk focused on building secured application with Oracle & .Net.
During the talk we’ve talked about how to build secured application, I've started with a brief background of secured development and then entered to four main points:
Securing the connection string
Input Validation
Authentication
VPD&RLS