PSfD: Team Blog

Premier Support for Developers

Browse by Tags

Tagged Content List
  • Blog Post: Building a Release Pipeline with TFS

    Leaders in the world of online businesses have shrunk the timeline for software delivery from months to days or even hours. No matter what size business you have, customers now expect features such as real-time customer service and frequent releases of services. ... read more
  • Blog Post: Team Foundation Server 2013 Power Tools

    It seems just yesterday that I mentioned the Power Tools for TFS 2012 and the benefits that it provides. Fast forward to today and the Power Tools for TFS 2013 are now available and have all been updated to work with VS 2013 and TFS 2013. ... read more
  • Blog Post: Holy //BUILD Batman!

    I thought the previous //BUILD conferences had a lot of content but this year definitely surpassed it. Although I couldn’t do the whole conference justice in a single blog post, here are a few key highlights... read more
  • Blog Post: ALM Summit Content Available On-Demand

    January's ALM Summit on the Microsoft Campus brought together some of the greatest minds in application development, methodologies, and application lifecycle management. All of the sessions were recorded and are now available for on-demand viewing on Channel 9. ... read more
  • Blog Post: Applying the SDL to Windows Azure

    Employing the security development lifecycle (SDL) has grown from desktop based applications to now cloud based applications. While building great software is significant, it’s crucial that the end product is secure and free of exploits (or at best ...read more
  • Blog Post: VM + SDL Process Template = Conundrum

    Virtualization technology certainly has changed the game when it comes to software development. Long gone are the days of hoping or guessing that the application developed will work on a disparate number of computer systems. Testing was possible but there ...read more
  • Blog Post: Security Development Lifecycle

    Building security into a system is difficult especially today as applications are more diverse in nature and span multiple technologies. Never the less, curtailing exploits and vulnerabilities from a development standpoint should be a high priority for ...read more
Page 1 of 1 (7 items)