Browse by Tags

Tagged Content List
  • Blog Post: Suppressing Personal Identifiable Information (PII) in WCF log files

    Given the vast amount of information transported between systems in today's enterprise environments, a lot of which is considered either private (addresses, social security numbers, credit card information, mortgage and pension plans, etc) or of high business value, information security is key. From...
  • Blog Post: Adding a new BizTalk Server Isolated Host needs a new Application Pool

    Recently, we tried creating a secondary Isolated Host to separate receive and send processing for WCF. After reconfiguring the servers, we were faced with the "Receive location for address ' ' not found. (The BizTalk receive location may be disabled)". Puzzled, we looked around for configuration issues...
  • Blog Post: Testing WCF service implementations

    When writing WCF implementations, or any code for that matter, testing is an important part of the process. This week, I was building tests for implemented WCF services and had difficulty aligning all the external dependencies of the tests (running hosts, configuration settings, behavior component references...
  • Blog Post: WCF Message validation (1) – WCF samples to the rescue

    Recently, I needed to validatie messages going into a WCF service. It turned out the WCF samples are a rich source of knowledge and I found a sample which performs XMLSchema-based validation in \TechnologySamples\Extensibility\MessageInspectors. The sample contains a few classes: ClientValidationException...
Page 1 of 1 (4 items)