The second-generation .NET Framework builds on the tools of the first to provide better, more standards-compliant XML data validation.
- By Thiru Thangarathinam
- 04/01/2005
What security hurdles can you overcome when using XML to develop against a services layer? A whiteboard diagram of security requirements mappings in an SOA shows you the way.
- By Mark O'Neill
- 03/01/2005
ASP.NET 2.0's master pages can help you develop consistent Web apps without the additional overhead of include files, user controls, or third-party add-ins.
Enterprise Development with Visual Studio .NET, UML, and MSF covers the UML models available in Visio, as well as tools and features for developing and testing enterprise systems.
The .NET Developer''s Guide to Windows Security helps put you on your way to developing secure applications in .NET.
Both major platforms push Web services as a means of integrating applications across platforms. Check out another alternative that tightly integrates Microsoft code with Java apps.
- By Peter Varhol
- 03/01/2005
Frank Gocinski, Microsoft''s ISV Business Development Evangelist Manager, discusses major developments for Tablet PC.
- By Patrick Meader
- 03/01/2005
Discover the many security services built into the ESB technology.
- By Mark O'Neill
- 02/08/2005
Peter Loforte discusses Microsoft's vision for Tablet PC and the future of mobile computing.
- By Patrick Meader
- 01/18/2005
Increase your users' perceived performance of your .NET application by using multithreading.
Rebecca M. Riordan's book, Seeing Data: Designing User Interfaces for Database Systems Using .NET, helps you learn how to design a database UI in order to display information effectively.
- By Mark Collins-Cope
- 01/01/2005
Network Programming in .NET: With C# and Visual Basic .NET shows you how to accomplish network-based programming in .NET using well-known protocols or ones you create yourself.
- By Mark Collins-Cope
- 01/01/2005
Ensuring maximum asset availability requires multiple layers of security working in concert to protect against intrusions, enforce usage policies, and allow machines to remain resilient to attacks - even when patching is not an option.
Try out some sample code that shows how to use the new ReportViewer controls to design and embed custom reports in your WinForms and WebForms projects.
- By Roger Jennings
- 01/01/2005
Just because something "appears" to be from a legitimate sender doesn't make it so.
- By Ben Schorr and Jim McBee
- 01/01/2005
Costs and expectations are well understood in centralized development projects, but the opposite is true with Microsoft Access and similar products. There's no standardization.
- By Danielle Ruest and Nelson Ruest
- 12/01/2004
Response time and scalability are key to optimal performance of your enterprise's applications. Set expectations and provide analysis tools to help you achieve performance goals.
- By Peter Varhol
- 12/01/2004
Following a management and maintenance regimen reduces administration, maintenance, and business expenses while increasing reliability, stability, and security.
- By Kenton Gardinier and John McMains
- 12/01/2004
Pass a user control from Windows Form to Windows Form to rearrange your graphical user interface (GUI) layout without needing to reinitialize the shared user control and more.
- By Michael Kennedy
- 12/01/2004
Architects, developers, and IT managers must take collective responsibility for creating secure solutions. Exploit Java's language- and enterprise-level security features to build a secure environment.