background preloader

Microsoft Unveils Expression Studio Design Tools Suite, 'Flash Killer'

Microsoft Unveils Expression Studio Design Tools Suite, 'Flash Killer'
Hewlett-Packard will apparently need close to two months to start fulfilling backorders for the (temporarily) revived TouchPad tablet. "It will take 6-8 weeks to build enough HP TouchPads to meet our current commitments, during which time your order will then ship from this stock with free ground shipping," read an email sent to customers and reprinted in a Sept. 7 posting on the Precentral.net blog. "You will receive a shipping notification with a tracking number once your order has shipped."That would place the new TouchPads in consumers' hands sometime in either late October or early November. Nicholas Kolakowski is a staff editor at eWEEK, covering Microsoft and other companies in the enterprise space, as well as evolving technology such as tablet PCs.

ACM Queue - A Conversation with Phil Smoot - An engineer at Hotmail discusses the challenges of keeping one of the Web’s largest and oldest Internet services running 24/7. A Conversation with Phil Smoot The challenges of managing a megaservice In the landscape of today’s megaservices, Hotmail just might be Mount Everest. One of the oldest free Web e-mail services, Hotmail relies on more than 10,000 servers spread around the globe to process billions of e-mail transactions per day. What’s interesting is that despite this enormous amount of traffic, Hotmail relies on less than 100 system administrators to manage it all. To understand how they do it, and to learn more about what it takes to manage such an enormous service, we invited Hotmail engineer Phil Smoot to speak with us. Smoot is interviewed by Queue editorial board member Ben Fried, who has his own experience managing a large IT infrastructure. Fried’s background in IT includes stints as a dBASE II programmer, front-line support manager, Windows 1.0 programmer, and Unix systems programmer. BEN FRIED Let’s start by talking about how you got into this job. PS The big thing you think about is cost.

State of Application Security: Immature Practices Fuel Inefficiencies, but Positive ROI Is Attainable - A Forrester Consulting Thought Leadership Paper Commissioned by Microsoft In November 2010, Microsoft commissioned Forrester Consulting to conduct a survey study of 150 North American software development influencers. The purpose of the study is to understand the current state of application security development practices and identify key trends and market directions for application security. In November 2010, Microsoft commissioned Forrester Consulting to conduct a survey study of 150 North American software development influencers. The purpose of the study is to understand the current state of application security development practices and identify key trends and market directions for application security. Key findings: Application security is not a mature practice for many. In general, application security remains a tactical concern versus a strategic initiative. Loading your results.

Security Analysis for Single-Sign-On (SSO) Websites Bill Gates' Farewell - Microsoft at CES 2007 Project Server 2007 VSTS Connector - Home Secure Habits: 8 Simple Rules For Developing More Secure Code -- MSDN Magazine, November 2006 Secure Habits 8 Simple Rules For Developing More Secure Code Michael Howard I have been lucky enough to work with thousands of good developers over the years who wanted to learn how to write more secure software. During this time, I've also learned a great deal from people who are very good at building secure systems, and this got me thinking. Now one thing I know for sure is that anyone reviewing this list will immediately see missing habits. Habit #1: Take Responsibility This is a variation of the classic "There is no silver bullet" comment made over 25 years ago by Fred Brookes in The Mythical Man Month. Secure products are built by developers who create secure designs and write secure code. Figure 1 Vulnerable Code is Written by Individuals Remember that all code will be scrutinized and possibly attacked. If at all possible, have your code peer-reviewed by a security expert. And don't be so bigheaded that you can't ask for help when you need it. Habit #2: Never Trust Data Habit #5: Fuzz!

A-Patch for Windows Live Messenger & MSN Messenger

Related: