Brian Johnson works with BizSpark Startups on the East Coast of the United States. For more information about the BizSpark program you can go to http://bizspark.com.
Developer Division LeaderSpeak
Many members of the Developer Division leadership team are blogging their plans for the division, and the products they are responsible for. This page gives you the ability to see what they are planning and insight into the direction for Visual Studio and the related products from now, through Whidbey and Burton, and to the future.
Hands-on Lab Drives JNetDirect to 64 Bits
JNetDirect is an expert software component company that provides data access, security and delivery to customers with growing business requirements. When some of JNetDirect's JSQLConnect and JDataConnect customers asked about the use of 64-bit versions of Microsoft SQL Server, JNetDirect decided to attend a 64-bit Hands-on Lab at the Microsoft Redmond campus. Two weeks of work at the lab and another two weeks at the office were enough to add 64-bit support to both products.
DirectX 9.0 SDK Update - (October 2004)Download the complete DirectX 9.0 SDK - (October 2004), which contains the DirectX 9.0c Runtime and all DirectX software required to create DirectX 9.0 compliant applications in C/C++, and C#.
If you haven't played with DirectX SDK before, this weekend might be a good time to download it and give it a shot. Be sure to check out the Microsoft DirectX 9.0 SDK Update item that gets added to your All Programs menu in Windows. There's a DirectX Sample Browser that lets you sort the samples available, and it even copies individual projects that you might want to start with to your Visual Studio Projects folder. You can find more DirectX information on MSDN here.
Update: Mitch Walker has more information about the changes here.
How A Criminal Might Infiltrate Your Network
One of the great mysteries in security management is the modus operandi of criminal hackers. If you don't know how they can attack you, how can you protect yourself from them? Prepare to be enlightened.
Privacy: What Developers and IT Professionals Should Know
In this new book, Microsoft privacy expert J.C. Cannon covers the technical and organization facets of protecting customer privacy J.C shows you how to systematically build privacy into any application, Web site, or enterprise system.
The Security Risk Management Guide
Customers can be overwhelmed when attempting to put in place a plan for security risk management. This can be because they do not have the in-house expertise, budget resources, or guidelines to outsource. To assist these customers, the Microsoft has developed The Security Risk Management Guide.
This guide helps customers of all types plan, build, and maintain a successful security risk management program. In a four phase process, depicted below, the guide explains how to conduct each phase of a risk management program and how to build an ongoing process to measure and drive security risks to an acceptable level.
Update: Chat is over, thanks everyone for coming. That was fun. Next chat is November 18th.
Update: This chat is happeing now. Click here to enter. (I'll pull this post off the security feed when the chat is finished.)
There's a chat tomorrow (Thursday) at 2:00 PST around Security in Microsoft Products. Here's a link to the chat page with more information. You can add this chat to your Outlook calendar by clicking here
Microsoft Security Chat SeriesJoin Mike Nash, Vice President for the Microsoft Security Business Unit, and his team of security experts each month. Microsoft is working hard to improve security and Mike and his team invite you to join them in a candid Q&A session. Ask us your tough questions; share with us what is going well and what needs improvement. This is your chance to talk up front with the leading security minds at Microsoft.
Schneier on Security
A weblog covering security and security technology.
All About GDI+
This page contains information about a newly-discovered, privately reported vulnerability in GDI+. A buffer overrun vulnerability exists in the processing of JPEG image formats that could allow remote code execution on an affected system. This page contains information and links for developers who need to better understand this issue.