Browse by Tags

Tagged Content List
  • Blog Post: Code Visualization and Architecture with Visual Studio 2010

    Come learn how the new code visualization, UML, and Architectural Validation tools inside Visual Studio 2010 come together to help you understand existing code bases, model domain specific problem domains, and maintain the proper control and visibility of those software systems. Date: February 25, 2010...
  • Blog Post: [Network World] Microsoft juices Visual Studio with secure coding tools

    At the Black Hat Conference taking place in Washington, D.C., Microsoft said it will deepen ties between its Visual Studio development tools and the secure applications development processes first developed inside the company and now available to outsiders. Read the full story…
  • Blog Post: Security Guidance: Security Development Lifecycle (SDL) - Version 4.1a

    As part of its commitment to a more secure and trustworthy computing ecosystem, Microsoft releases the SDL process guidance 4.1a. IT policy makers and software development organizations can leverage this content to enhance and inform their own software security and privacy assurance programs. The Microsoft...
  • Blog Post: October Newsletter – Editor’s Choice

    Scalability, RIA, deployment and trends in October release of the Journal newsletter.   Sign up for other newsletters | Unsubscribe | Update your profile Editor's Choice October 2009 Resources for Architects: Editor's Choice   Scalability: 10 Ways to Take your Site from One to One Million Users...
  • Blog Post: Revenue Assurance: Search Engine Optimization (SEO) Toolkit Beta

    The IIS Search Engine Optimization (SEO) Toolkit is an IIS7 extension that helps identify search engine and user experience optimizations for Web sites. The following features are included: Site Intelligence Reporting and error identification for broken/invalid links, duplicate content, tag...
  • Blog Post: Security Verification: BinScope Binary Analyzer

    The BinScope Binary Analyzer is a Microsoft verification tool that analyzes binaries to ensure that they have been built in compliance with Microsoft’s Security Development Lifecycle (SDL) requirements and recommendations.  BinScope checks that SDL-required compiler/linker flags are being set, strong...
  • Blog Post: Security Testing: MiniFuzz File Fuzzer

    MiniFuzz is a basic testing tool designed to help detect code flaws that may expose security vulnerabilities in file-handling code. This tool creates multiple random variations of file content and feeds it to the application to exercise the code in an attempt to expose unexpected application behaviors...
  • Blog Post: Desktop Deployment: a Toolkit for Operating System and Application Deployment Just Released

    Microsoft Deployment Toolkit 2010 (MDT 2010) provides a common console with the comprehensive tools and guidance needed to efficiently manage deployment of Windows 7 and Windows Server 2008 R2. Microsoft Deployment Toolkit 2010 is the recommended process and toolset to automate desktop and server deployment...
  • Blog Post: Doloto: The Power of AJAX without Its Headaches (a Microsoft Research Project)

    Doloto is an AJAX application optimization tool, especially useful for large and complex Web 2.0 applications that contain a lot of code, such as Bing Maps, Hotmail, etc. Doloto analyzes AJAX application workloads and automatically performs code splitting of existing large Web 2.0 applications. After...
  • Blog Post: What Visual Studio 2010 Has to Offer to Software Architects

    Designing new functionality on existing applications can be daunting. There are always differences between the original design and the current implementation. The new Architecture tools within Visual Studio Team System 2010 help you understand the application you have, design new functionality you need...
  • Blog Post: Security Threats: Code Analysis Tool .NET (CAT.NET) Preview

    CAT.NET is a binary code analysis tool that helps identify common variants of certain prevailing vulnerabilities that can give rise to common attack vectors such as Cross-Site Scripting (XSS), SQL Injection and XPath Injection. The tool can function as a plug-in for Visual Studio 2005/2008, FxCop custom...
  • Blog Post: Security Guidance

    As part of its commitment to a more secure and trustworthy computing ecosystem, Microsoft releases the SDL process guidance v4.1. IT policy makers and software development organizations can leverage this content to enhance and inform their own software security and privacy assurance programs. Get the...
  • Blog Post: FxCop 1.36

    FxCop is an application that analyzes managed code assemblies (code that targets the .NET Framework common language runtime) and reports information about the assemblies, such as possible design, localization, performance, and security improvements . FxCop is intended for class library developers. However...
  • Blog Post: Health Monitoring: Designing Manageable Applications

    This guide describes how to create applications that are easier to manage. When used alongside the associated code artifacts, this guide should help dramatically simplify the process of creating manageable applications, and therefore reduce the costs associated with application operations. This guide...
Page 1 of 1 (14 items)