Microsoft on ISVs

Technology and Partnering Insights and Resources for ISVs Around the World. SUBSCRIBE TO THIS RSS!

Browse by Tags

Tagged Content List
  • Blog Post: Software Companies Shine with Microsoft Surface™ and Virtual Earth™ Technology at the Superbowl

    This post on the Microsoft Surface™ blog showcases some great Microsoft partners and the ways they’re leveraging Microsoft’s most exciting Surface™ and Virtual Earth™ technologies. The collaborative effort yielded compelling event monitoring results which were utilized by the security teams in Tampa...
  • Blog Post: Microsoft Releases Internet Explorer 8 RC 1

    Monday, Microsoft released Internet Explorer 8 RC1 which you can download here . Why bother? Well, here are a few thoughts: In PC World, Preston Gralla wrote: “The just-released Release Candidate 1 (RC1) of Internet Explorer 8 is a fast, stable browser , tweaked for productivity and security...
  • Blog Post: Baking Security In: SDL Awareness

    If you missed the announcements last week at Tech Ed in Barcelona Spain, here are some highlights for all of you who are designing, managing and developing software applications. Read on to understand the benefits of introducing security and privacy early and throughout the development process. Microsoft...
  • Blog Post: Are You Prepared for Online Attacks?

    Do you know that weapons of choice for online attacks are "Trojan Horses," software applications hidden inside programs that computer users are duped or coaxed into downloading, according to the Microsoft report? Read about this and the latest assessment of threats and vulnerabilities in the Security...
  • Blog Post: Security Training May 6th & 7th in Redmond, WA

    In my previous posts, I addressed two pieces of security guidance as well as writing better code for web applications . I’m working hard to address the fact that security is a core requirement for software products. The need for applications which protect data and infrastructures as well as the need...
  • Blog Post: Interoperability Executive Customer (IEC) Council, Volume 2 – How it works

    In my last post, I mentioned the six IEC Council work streams. Office Productivity and Collaboration Tools, Developer Tools and Runtime, Systems Management, Security and Identity Management, Business Process Modeling, and Public Interoperability Policy. Here is a little more about each one. Work stream...
  • Blog Post: Interoperability Executive Customer (IEC) Council, Volume 1 – What our customers are telling us.

    The Interoperability Executive Customer (IEC) Council has been mentioned several times in recent announcements and blogs on interoperability. As someone deeply involved in the IEC Council, I want to share what the IEC Council is, how it is advising Microsoft on Interoperability scenarios and issues,...
  • Blog Post: Q&A with Full Armor CTO Danny Kim

    Recently, Channel 9 host, Charles Torre, had an opportunity to talk with Full Armor CTO, Danny Kim, a Microsoft Global ISV partner. The interview is informative, entertaining and well worth watching. Here are a few highlights for your reading pleasure. To view the full interview, simply click here. ...
  • Blog Post: Hello Secure World…Write Safer Code, Build Safer Web and Surf Safer Net - Part 2

    Remember the days of “ hello world! ” and programming DOS-based stand-alone desktop applications? Well, those days are over. Today, web application development is more complex than the traditional stand-alone or client/server approach to writing software. Web developers have to be familiar with the complicated...
  • Blog Post: Check out the Channel 9 Inside Out interview with Gabriel Torok of PreEmptive Software

    Channel 9 host Charles Torre posted a great 10 minute interview he captured at Tech Ed in Barcelona with PreEmptive Software President, Gabriel Torok. Torok and Torre discuss Dotfuscator and their protection solution which protects .net applications. Learn how PreEmptive solutions can add value to your...
  • Blog Post: Security Intelligence Report and other security guidance – Part 1

    Recently on MSDN , we featured 2 important pieces of security guidance for developers – the Windows Vista ISV Security article and the 2007 Office Security Guide . This provides relevant guidance to assist developers in understanding the new security technology built into Vista and Office; as well as...
Page 1 of 1 (11 items)