VIOLATING THE CODE

and other things testers do

  • VIOLATING THE CODE

    Security State and NGEN

    • 4 Comments
    NGEN images are not guaranteed to be used by the runtime. There’s a tradeoff with NGen that is always being evaluated where robustness of images is balanced against better performance when images are used. At one extreme, NGEN images are very robust and...
  • VIOLATING THE CODE

    NGEN Article

    • 12 Comments
    I've been working a little on the side lately to put together an article on NGEN for MSDN magazine. We finished with the final changes a few days ago, and just three days later I was suprised to see it already published on the website! MSDN Mag is running...
  • VIOLATING THE CODE

    Post #2

    • 2 Comments
    In my last blog entry I said I would have another entry up by the end of the long weekend. Of course, that means that I will scramble to put something together late Sunday evening. Unfortunately I was waylaid (once again) by Tivo and the fact that it...
  • VIOLATING THE CODE

    Nowhere to start but the beginning

    • 5 Comments
    0. That's how many blog posts I have written before. It also happens to be the expected readership of this blog. Having no idea how to do this and suspecting that no one will ever care, I'll just say a few things about myself and what I do and some of...
Page 1 of 1 (4 items)