from ideas to solutions

The Latest Blog Posts
  • Sean McBreen's WebLog

    The Age of Spiritual Machines

    I’ve just finished reading the bulk of Ray Kurzwell’s book and it’s been pretty interesting. The book focuses on the cultural effects of computers as Morres Law accelerates into 2009, 2019, 2029 and finally into 2099. Ray shows huge passion in describing...
  • The Old New Thing

    What other effects does DS_SHELLFONT have on property sheet pages?

    Once you invent a new flag you can start using it to fix errors of the past....
  • Joe Stagner - Frustrated by Design !

    SECURITY- Standard Phishing Attack Example.

    It's called Phishing - I got this one in my email account this morning. In a seminar recently a developer asked me for an example of how Phishing works and I thought this was a good typical example - so I'd bog it. NOTICE: Never Click on a...
  • Ulrich's SOAP Box

    A new blog...

    A friend of mine, Alex James, has just started blogging. Alex owns his own small company, building some pretty slick software which allows applications to share data or datalayers. You can find his blog here , and download his software from his web site...
  • Omar Shahine

    Send to SmugMug

    I love SmugMug so much I wanted a really easy way to get my pictures from my hard drive to SmugMug . Enter Send to SmugMug . This application will install a little entry in your contextual menu for folder that says... "Send to SmugMug". When you select...
  • Antimail

    Quick Puzzle: what does this program print?

    You have 30 seconds left... just kidding :-) using System; using System.Collections; using System.Reflection; class Hello { Type Unknown { get { return World.GetType(); } } object [] Knowledge() { return Unknown.GetProperties(); } string [] Library()...
  • Peter Torr's Blog

    High-Level Threat Modelling Process

    The following is a (slightly modified) version of a document I wrote for the VSTO team way back in the day. You might find it useful as you plan threat modelling for your product(s). You should of course read the Threat Modelling book from Microsoft Press...
  • edjez's WebLog

    VB6 --> VB.NET Guidance

    This is not about EntLib and not about Smart Client specifically, but we expose some plans soon around working on VB6 --> .NET guidance focused on Enterprise customers' LOB apps. Part of the challenge with this guide will be finding and keeping to...
  • Rob's Speech Stuff

    about me

    Like the title says, my name's Robert Brown. I'm a Program Manager at Microsoft, working on speech technologies - in particular, the APIs. I expect this log to be about both program management and speech. We'll see if I predict correctly. What's speech...
  • [MSFT]

    Do you want to help test SQL Server 2000 Service Pack 4?

    My old colleagues in the SQL Server team are working hard on getting SQL Server 2000 Service Pack 4 out the door, but they need your help in making sure it is high quality. So if you want to help out by beta testing SP4 then follow these guidelines. SQL...
  • Aaron Stebner's WebLog

    Don't use vbscript/jscript to write your custom actions!

    Rob Mensching wrote a blog entry a while back that explains some reasons why you should not use script-based custom actions in your setup. I encourage you all to read it if you haven't yet, and I also strongly encourage you to heed his recommendations...
  • Junfeng Zhang's Windows Programming Notes

    Duplicate entries in config files

    If there are multiple (conflicting) policy statements for the same assembly in a config file, which policy will fusion take? In .Net v1.0/v1.1, we will take the first policy. The rest policies are practically no-op. In .Net 2.0, we will preserve the same...
Page 31346 of 33,551 (402,603 items) «3134431345313463134731348»