(Scott Mitchell) A couple of weeks ago I wrote an article here on 4Guys titled Why I Don’t Use DataSets in My ASP.NET Applications. At the end of that particular article I provided a link to a blog entry of mine where a small discussion on this topic had already started. As of May 16th, 2005, that b
Tag: Development
When and when not to refactor
(Scott Robinson) You’re in the middle of a massive re-write of a system that’s been in production some time. You have issues piled on top of more issues — scalability, lack of robustness, maintenance problems, documentation errors and gaps — and you’re looking for ways to attack this beast. Oh, and
Threat Modeling Web Applications
(J.D. Meier, Alex Mackman and Blaine Wastell) This guidance presents the patterns & practices approach to creating threat models for Web applications. Threat modeling is an engineering technique you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect
Seven key types of security auditing
Establishing a proper security posture involves risk assessment, threat analysis, and formulation of an organizational policy. But the job doesn’t end there–once your policy and controls are in place, you must make sure your protection remains effective as company needs and business conditions chan
Web Services Using JavaScript and .NET
(Prasad Kopanati) I thought to write this article because there are very few resources that elaborate on client-side consuming a Web service. This type of consuming is very handy when one has to make Web service calls to a remote Web server directly from the client. One can think of many instances w
Previous or Next? Paginating Records with PHP, part 4
(Alejandro Gervasio) In the fourth and final article in our series about paginating records with PHP, we will look at the source code for the “pager” PHP class we developed in part three, and show several examples to demonstrate possible uses in production environments.
Generating and working with GUIDs in .NET
(Tony Patton) When Windows developers need a unique value, they often utilize a Globally Unique Identifier (GUID). Microsoft uses the term GUID for a unique number that identifies an entity, such as a Word document.
Visual Studio Team System
(Matt Nicholson) Despite the strength of Visual Studio and the .NET Framework, Microsoft’s attempts to move into the wider market of software design and process control, namely Visio and Visual SourceSafe, have not had much impact, allowing other companies such as IBM Rational, Compuware and Borland
Taking Advantage of PEAR
(W. Jason Gilmore) All programmers know that code reuse is the key to an efficient and timely, not to mention sane, application development process. Yet far too few practice what is so often preached, much to the chagrin of colleagues, clients, and project managers everywhere. Such irrationality
Your free search engine – Microsoft Indexing Server
(Klaus Salchner) Many web applications provide a search capability, which allows users to search all the content of a web application. This seems at first glance to be a difficult task. How can you search all the files in your web application and at the same provide robust search capabilities most u