background preloader

Microsoft

Facebook Twitter

Virtualization

XML. Project Server 2007 VSTS Connector - Home. Security Analysis for Single-Sign-On (SSO) Websites. ACM Queue - A Conversation with Phil Smoot - An engineer at Hotmail discusses the challenges of keeping one of the Web’s largest and oldest Internet services running 24/7. A Conversation with Phil Smoot The challenges of managing a megaservice In the landscape of today’s megaservices, Hotmail just might be Mount Everest. One of the oldest free Web e-mail services, Hotmail relies on more than 10,000 servers spread around the globe to process billions of e-mail transactions per day.

What’s interesting is that despite this enormous amount of traffic, Hotmail relies on less than 100 system administrators to manage it all. To understand how they do it, and to learn more about what it takes to manage such an enormous service, we invited Hotmail engineer Phil Smoot to speak with us. Smoot has been with Microsoft for 11 years and is a product unit manager in Microsoft’s MSN division. Smoot is interviewed by Queue editorial board member Ben Fried, who has his own experience managing a large IT infrastructure.

Fried’s background in IT includes stints as a dBASE II programmer, front-line support manager, Windows 1.0 programmer, and Unix systems programmer. PS Yes. Microsoft Unveils Expression Studio Design Tools Suite, 'Flash Killer'. Hewlett-Packard will apparently need close to two months to start fulfilling backorders for the (temporarily) revived TouchPad tablet. "It will take 6-8 weeks to build enough HP TouchPads to meet our current commitments, during which time your order will then ship from this stock with free ground shipping," read an email sent to customers and reprinted in a Sept. 7 posting on the Precentral.net blog. "You will receive a shipping notification with a tracking number once your order has shipped.

"That would place the new TouchPads in consumers' hands sometime in either late October or early November. The reduced-price devices are not returnable, according to the email. HP originally acquired webOS as part of its takeover of Palm in 2010. Nicholas Kolakowski is a staff editor at eWEEK, covering Microsoft and other companies in the enterprise space, as well as evolving technology such as tablet PCs. State of Application Security: Immature Practices Fuel Inefficiencies, but Positive ROI Is Attainable - A Forrester Consulting Thought Leadership Paper Commissioned by Microsoft. In November 2010, Microsoft commissioned Forrester Consulting to conduct a survey study of 150 North American software development influencers. The purpose of the study is to understand the current state of application security development practices and identify key trends and market directions for application security.

In November 2010, Microsoft commissioned Forrester Consulting to conduct a survey study of 150 North American software development influencers. The purpose of the study is to understand the current state of application security development practices and identify key trends and market directions for application security. Key findings: Application security is not a mature practice for many.

In general, application security remains a tactical concern versus a strategic initiative. Accountability and incentives to promote secure software development are lacking. Those employing a more coordinated, prescriptive approach to application security saw more positive ROIs. Bill Gates' Farewell - Microsoft at CES 2007. Windows Sockets Error Codes. Secure Habits: 8 Simple Rules For Developing More Secure Code -- MSDN Magazine, November 2006.

Secure Habits 8 Simple Rules For Developing More Secure Code Michael Howard I have been lucky enough to work with thousands of good developers over the years who wanted to learn how to write more secure software. During this time, I've also learned a great deal from people who are very good at building secure systems, and this got me thinking. I wondered if there were common skills or habits the "secure developers" share. It turns out the answer is a resounding yes! Now one thing I know for sure is that anyone reviewing this list will immediately see missing habits. Habit #1: Take Responsibility This is a variation of the classic "There is no silver bullet" comment made over 25 years ago by Fred Brookes in The Mythical Man Month. Secure products are built by developers who create secure designs and write secure code.

Figure 1 Vulnerable Code is Written by Individuals Remember that all code will be scrutinized and possibly attacked. Habit #2: Never Trust Data Habit #4: Stay One Step Ahead. A-Patch for Windows Live Messenger & MSN Messenger. Express - Visual Web Developer - Easy to Use.