Brian Johnson works with BizSpark Startups on the East Coast of the United States. For more information about the BizSpark program you can go to http://bizspark.com.
How A Criminal Might Infiltrate Your Network
One of the great mysteries in security management is the modus operandi of criminal hackers. If you don't know how they can attack you, how can you protect yourself from them? Prepare to be enlightened.
Hands-on Lab Drives JNetDirect to 64 Bits
JNetDirect is an expert software component company that provides data access, security and delivery to customers with growing business requirements. When some of JNetDirect's JSQLConnect and JDataConnect customers asked about the use of 64-bit versions of Microsoft SQL Server, JNetDirect decided to attend a 64-bit Hands-on Lab at the Microsoft Redmond campus. Two weeks of work at the lab and another two weeks at the office were enough to add 64-bit support to both products.
High Performance Computing for Windows Server 2003
Some of the toughest computing challenges in the world are tackled and often solved by using high performance computing (HPC) clusters. Companies can now deploy clusters of servers running Windows Server 2003 to benefit from supercomputing power at a fraction of the cost. This site discusses Microsoft HPC solutions and demonstrates how Windows Server 2003 is the premier platform for customers seeking performance, scalability, and reliability.
Mobile Application Development Toolkit
The Mobile Application Development Toolkit provides all the resources you need to start building mobile applications for Windows Mobile-based Smartphone and Pocket PC devices.
Privacy: What Developers and IT Professionals Should Know
In this new book, Microsoft privacy expert J.C. Cannon covers the technical and organization facets of protecting customer privacy J.C shows you how to systematically build privacy into any application, Web site, or enterprise system.
The Security Risk Management Guide
Customers can be overwhelmed when attempting to put in place a plan for security risk management. This can be because they do not have the in-house expertise, budget resources, or guidelines to outsource. To assist these customers, the Microsoft has developed The Security Risk Management Guide.
This guide helps customers of all types plan, build, and maintain a successful security risk management program. In a four phase process, depicted below, the guide explains how to conduct each phase of a risk management program and how to build an ongoing process to measure and drive security risks to an acceptable level.
Developer Division LeaderSpeak
Many members of the Developer Division leadership team are blogging their plans for the division, and the products they are responsible for. This page gives you the ability to see what they are planning and insight into the direction for Visual Studio and the related products from now, through Whidbey and Burton, and to the future.
NewsGator Online Edition FREE to Consumers
DENVER, CO — October 18, 2004 — NewsGator Technologies, Inc., the leading RSS software platform company, announced that a new version of NewsGator Online will now be free to consumers at http://www.newsgator.com. NewsGator has added a number of cutting-edge innovations to its existing state-of-the art web-based aggregator and now, users can track all their favorite RSS and news feeds online at no charge.