background preloader

Programacion

Facebook Twitter

Attaching databases via a dockerfile | DBA From The Cold. Last week I presented my session on SQL Server & Containers for the PASS Virtualization Group and during my prep I noticed that there’s some functionality available to Windows containers and not Linux containers. One of the (if not the) main benefits of working with SQL in a container is that you can create a custom image to build container from that has all of your development databases available as soon as the container comes online. This is really simple to do with Windows containers. Say I want to attach DatabaseA that has one data file (DatabaseA.mdf) and a log file (DatabaseA_log.ldf): – Nice and simple! However this functionality is not available when working with Linux containers.

This was a problem for me as I wanted to change things up a little for the Virtualization Group’s webinar. I started doing some research online and there are different work arounds to attaching the database into SQL in a Linux container but they all involved separate scripts outside of the dockerfile. Migrar aplicaciones de ASP.NET MVC a contenedores de Windows. C# - Prevent Caching in ASP.NET MVC for specific actions using an attribute. How do I set the request timeout for one controller action in an asp.net mvc application.

[Whitepaper] High Performance with Distributed Caching. C# code format. Chapter 15 - Measuring .NET Application Performance. Improving .NET Application Performance and Scalability J.D. Meier, Srinath Vasireddy, Ashish Babbar, Rico Mariani, and Alex Mackman Microsoft Corporation May 2004 Related Links Home Page for Improving .NET Application Performance and Scalability Send feedback to Scale@microsoft.com patterns & practices Library Summary: This chapter provides coding techniques and tools to measure system and application performance. Contents ObjectivesOverviewHow to Use This ChapterGoals of MeasuringMetricsHow Measuring Applies to Life CycleTools and TechniquesInstrumentationSystem Resources.NET Framework TechnologiesCLR and Managed CodeASP.NETWeb ServicesEnterprise ServicesRemotingInteropADO.NET/Data AccessSummaryAdditional Resources Objectives Instrument your applications.

Overview To determine whether your application meets its performance objectives and to help identify bottlenecks, you need to measure your application's performance and collect metrics. How to Use This Chapter Goals of Measuring Throughput Metrics. What not to do in ASP.NET, and what to do instead. This topic describes several common mistakes people make within ASP.NET web projects. It provides recommendations for what you should do to avoid these common mistakes. It is based on a presentation by Damian Edwards at Norwegian Developers Conference. Disclaimer This topic is not intended as a complete guide to ensure your application is secure and efficient. Overview This topic contains the following sections: Standards Compliance Control Adapters Recommendation: Stop using control adapters for adaptive rendering, and instead use CSS media queries and standards-compliant HTML.

Controls Adapters were introduced in .NET 2.0 to render presentation code that was customized for different devices and environments. For more information, see Media Queries and How To: Add Mobile Pages to Your ASP.NET Web Forms / MVC Application. Style Properties on Controls Recommendation: Stop setting style values in the control markup, and instead set formatting values in CSS stylesheets. Page and Control Callbacks. KnockoutJS vs AngularJS | Next Big Thing. Luckily (or unluckily ? ), I keep getting opportunities to work with everything other than Angular. In my latest assignment, I have had the opportunity to work with Knockout. I have to say that I liked it and would have picked Knockout as my favorite framework if Angular did not exist. People keep asking these questions and probably there is a good reason for it. Templating Angular and Knockout both provide DOM based templating.

Angular only supports HTML as its templating mechanism. Knockout by default uses HTML as its templating mechanism ( which is where they both have DOM based templating ) , but Knockout also supports other string based templating engines like Handlebars etc (but I think hardly anyone uses that!). Unobtrusive Knockout tries to please people who are interested in Unobtrusive Stuff.. Angular doesnt believe in it ( or the authors of angular do not make any exceptions to provide for unobtrusive cases. ) 1. Or. Developer.force.com. Topshelf. Improving .NET Application Performance and Scalability. Patterns and practices Developer Center J.D. Meier, Srinath Vasireddy, Ashish Babbar, and Alex Mackman Microsoft Corporation April 2004 Related Links Errata Page Buy "Improving .NET Application Performance and Scalability" book patterns & practices Library Summary: This guide provides end-to-end guidance for managing performance and scalability throughout your application life cycle to reduce risk and lower total cost of ownership.

Contents AbstractTable of ContentsFeedback and SupportThe Team Who Brought You This Guide Abstract This guide covers Microsoft's recommendations on how to build .NET applications that meet your performance objectives. Figure 1: The scope of the guide The guidance is organized by categories, principles, roles, and stages of the life cycle: Performance objectives enable you to know when your application meets your performance goals. Table of Contents Part I, Introduction to Engineering for Performance Chapter 1 — Fundamentals of Engineering for Performance Checklists J.D.

SQL Performance

Analyzing IIS Log files using Log Parser – Part 1 - Mike McIntyre's Blog. Working with SharePoint, I often find myself in situation where I need to analyze IIS log files in a variety of ways to understand what kind of load is being placed on the system. In an effort to make this easier for me, and others, I have tried to automate, script, etc., wherever possible. The first pass that I typically run on the IIS data is to slice the IIS traffic by hour. IIS Logs files record their time in UTC; however, most people live/operate in a different time zone. In order to make the results more reflective of the actual user environment, you will need to adjust the times, either forward or backwards relative to UTC, to compensate for your particular environment.

The Scripts For ease of use, I typically put my Log Parser scripts into a file and then reference them via the command line. This has the added advantage of allowing me to pass in arguments from the command line. HitsByHourMinusGMT.sql 3: COUNT(*) AS Hits 5: %destination% FROM %source% 7: Hour 9: Hour ASC Traffic.cmd. 10 Must-Have Chrome Extensions for Developers.

Hadoop

BD001EN - Hadoop Fundamentals I. Secure Your REST API... The Right Way | Stormpath. Update: Stormpath now secures authentication to your API- without code! (Even if you’re working with SAML!) We already showed you how to build a Beautiful REST+JSON API, but how do you build API security? At Stormpath, we spent 18 months researching REST API security best practices, implementing them in the Stormpath Authentication API, and figuring out what works. Here’s our playbook on building and securing REST APIs: Choose the Right API Security Protocol Industry standard authentication protocols help reduce the effort of securing your API.

Basic API Authentication w/ TLS Basic API authentication is the easiest of the three to implement, because the majority of the time, it can be implemented without additional libraries. OAuth1.0a OAuth 1.0a is the most secure of the three common protocols. OAuth2 OAuth2 sounds like an evolution of OAuth1, but in reality it is a completely different take on authentication that attempts to reduce complexity. Custom Protocols What did we choose? Entropy. Romper contraseñas de 16 caracteres. En marzo, Nate Anderson, subdirector de Ars Technica y subdirector y novato auto-admitido del descifrado de contraseñas, descargó una lista de más de 16.449 contraseñas y a las pocas horas, descifró casi la mitad de ellos. La moraleja de la historia: si un reportero con una formación cero en el arte de descifrado de contraseñas puede lograr tales resultados, imaginen lo que los atacantes más experimentados pueden hacer.

Se sabe que las contraseñas débiles son terriblemente insegura pero lo ¿qué pasaría si se lograra descifrar cualquier contraseña de hasta 16 caracteres? Para conocer la respuesta se consultó a tres expertos de craqueo de contraseñas para atacar a la misma lista Anderson y el grupo de hackers ha conseguido descifrar más de 14.800 contraseñas supuestamente aleatorias de la lista de 16.449 Hash MD5 (sin salt), utilizando el Cracking de contraseñas con GPU. Cristian de la Redacción de Segu-Info.

Libros

Dario Pardo's cave » Shared Talend Open Studio Job Repository with Subversion. Talend Open Studio is an open source Data Integration/ETL tool that allows creating complex jobs through an easy-to-use graphical interface based on the Eclipse platform. It allows for rapid development through its hundreds of prebuilt components to source and target systems. However, as great as Talend is, there is one caveat; the FREE version does not come with version control and a shared job repository integrated into the product.

Problem This means that if one developer created a job design, and a second developer needs to make modifications to it in the future to handle new requirements, that second developer would not able to do it because that job is in another’s developer workstation. Prerequisites In order to develop new and or maintain existing Talend jobs you will need Talend Open Studio. Solution Here, I will show you how to integrate Talend with SVN so that an entire team can work on the same jobs code base. Checking Out a Talend Project from a Shared Job Repository or.

BI

Installing iOS SDK and Xcode on Windows 7 [Updated] | The iPod touch Weblog - Apple News, Tricks, and Themes. Update 2: August 17, 2011 The TechExxpert guide has been updated to fully allow Xcode 4.1 to work. Sorry that the past fixes did not work. Thanks for the comments! Please let me know if this guide works/doesn't work. Update: This guide has been modified to the latest updates as of August 2, 2011 including the latest Xcode 4.1 and OS X Lion 10.7. Apple has been adamantly refusing to create an iPhone SDK support for Windows-based machines.

The following steps involve installing a virtual machine on your PC, updating the virtual machine to 10.7 , then running the machine and downloading and installing the iOS SDK and Xcode on to the virtual machine. There are other ways to install OS X on your machine but they involve creating a new partition and installing the Operating System directly to your hard drive. The process will take 2-3 hours, but most of the time is consumed by large downloads. 1. 2. 3. 4. 6. 7. Now you can start coding an app for your personal use.

Microsoft

TechExxpert: How to Virtualize OS X Lion on Windows. Update: Fixed down hard drive files (February 8, 2012). Sorry about the delay guys, this page has been updated so that Xcode 4.1 does not crash anymore. (August 17, 2011). If you've tried to virtualize previous versions of OS X, you know that it is a very tedious and time consuming process. This new guide works by giving you a simple VMWare Image. This guide will show how to setup a fully working OS X Lion 10.7 on a Windows machine. Requirements A laptop or desktop computer that supports virtualization (most newer computers do). An updated video has been made of all the new steps: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Xplico - Open Source Network Forensic Analysis Tool (NFAT)

Big Data Right Now: Five Trendy Open Source Technologies. Big Data is on every CIO’s mind this quarter, and for good reason. Companies will have spent $4.3 billion on Big Data technologies by the end of 2012. But here’s where it gets interesting. Those initial investments will in turn trigger a domino effect of upgrades and new initiatives that are valued at $34 billion for 2013, per Gartner. Over a 5 year period, spend is estimated at $232 billion. What you’re seeing right now is only the tip of a gigantic iceberg. Big Data is presently synonymous with technologies like Hadoop, and the “NoSQL” class of databases including Mongo (document stores) and Cassandra (key-values).

But there are new, untapped advantages and non-trivially large opportunities beyond these usual suspects. Did you know that there are over 250K viable open source technologies on the market today? We have a lot of…choices, to say the least. What’s on our own radar, and what’s coming down the pipe for Fortune 2000 companies? Storm and Kafka Why should you care? Drill and Dremel. Storm, distributed and fault-tolerant realtime computation. Capturing – Improving Performance of the Adaptive Web.

Responsive design is now widely regarded as the dominant approach to building new websites. With good reason, too: a responsive design workflow is the most efficient way to build tailored visual experiences for different device screen sizes and resolutions. Responsive design, however, is only the tip of the iceberg when it comes to creating a rich, engaging mobile experience. The issue of performance with responsive websites Performance is one of the most important features of a website, but is also frequently overlooked. Performance is something that many developers struggle with – in order to create high-performing websites you need to spend a lot of time tuning your site’s backend.

When it comes to creating responsive websites, the performance challenges are even more difficult because you have a single set of markup that is meant to be consumed by all kinds of devices. Introducing Capturing A solution to the responsive image problem With Capturing, this is no longer true. Performance.

Node.js

Kanban. Android. NMEA 0183 Sentence parser/builder. Introduction NMEA 0183 is a combined electrical and data specification for communication between marine electronic devices such as echo sounder, sonars, anemometer, gyrocompass, autopilot, GPS receivers, and many other types of instruments. NMEA 0183 standard uses a text-based (ASCII) serial communications protocol. It defines the rules for transmitting "sentences" from one "talker" to multiple listeners. Yes, there are many different NMEA sentence parser implementations in C#. Shortly about NMEA 0183 protocols There are two layers in NMEA 0183: data link layer application layer protocol In fact, data link layer defines only serial configuration: bit rate (typically 4800) 8 data bits no parity checking 1 stop bit no handshake Application layer is more complex, but not so.

$<talker ID><sentence ID,>[parameter 1],[parameter 2],... It is necessary to specify: NMEA defines two types of sentences: proprietary and non-proprietary. I will explain it with an example for a (standard) 'GLL' GPS sentence: C#/.NET Toolbox: A Debugable, Self-Installable Windows Service Template (Redux)