(Daniel Anderson) The HIPAA Security Rule became final in February 2003, and Healthcare Organizations (HCO’s) are now working towards the compliance deadline of April 21, 2005 which has already occurred. The final HIPAA Security Rule has a flexible approach; the recurring theme is that HCO’s mu
Tag: Development
Declare your PHP database independence with PEAR and this script
PHP comes with extensions for a variety of different databases: MySQL, SQLite, SQL Server, PostgreSQL, Oracle, Sybase and many more. However, each extension uses its own set of functions to communicate with the database server and perform SQL queries, making it well-nigh impossible to easily switch
Administrate Indexing Server from within your application
(Klaus Salchner) You can leverage Microsoft Indexing Server to provide powerful search capabilities within your application. Indexing Server can be used to index files on your local or network file system as well as files of your local web site. You can then query the Indexing catalog using a standa
New Recommendations for Using Strings in Microsoft .NET 2.0
(Dave Fetterman) Code owners previously using the InvariantCulture for string comparison, casing, and sorting should strongly consider using a new set of String overloads in Microsoft .NET 2.0. Specifically, data that is designed to be culture-agnostic and linguistically irrelevant should begin spec
Cryptography and .NET Framework – Part 2 (Secret key Encryption)
(Bipin Joshi) In the Part 1 we learnt the basics of Cryptography and related .NET Framework classes. In this article we are going to see how to work with Secret Key Encryption using Triple-DES algorithm.
Unhandled Exceptions and Tracing in the .NET Framework 2.0
(John Robbins) By now, you’ve certainly heard about the big changes coming in Visual Studio 2005, but when it’s time to move your code over it will be the small things that trip you up. In this column, I want to cover two of the many excellent changes that you could easily overlook as you make the m
Security Overview (Sample Chapter)
(Anthony Velte and Toby Velte) When we talk about “security” we know what we want, but describing it and making it happen can be different matters altogether. Network security has a natural conflict with network connectivity. The more an autonomous system opens itself up, the more risk it takes
Exception Handling in ASP.NET Application
(Rakheesh) Exception handling is one of the core areas where a software architect needs to concentrate during SDLC cycle. The importance of exception handling comes in the entire cycle of SDLC. During design time, designers have to forcast the type of the error that can be occurred in particular com
StringStream, Methods with Timeouts
(Stephen Toub) I’m trying to use a method that accepts a Stream as a parameter. However, the data I want to pass to that method is currently stored only as a string. Can you tell me what is the best way for me to pass the string to this method?
Using the CMAB for Enterprise, Client, and User Settings
(Rocky Lhotka) Applications use many forms of configuration data, storing settings that are used in applications, enterprise, client computers, and user settings. The Configuration Management Application Block (CMAB) is typically used for application settings, but it can be enhanced to support more