Visual studio feeds

All Visual Studio blogs in one place

Subscribe

Enter your email address:

Delivered by FeedBurner

Increase your website traffic with Attracta.com

Google+

Contact

Email:
Subject:
Message:
Anti-spam: How many eyes has a typical person?

Follow us on FB

Search

The design of RavenDB 4.0: Making Lucene reliable

AddThis Social Bookmark Button
I don’t like Lucene. It is an external dependency that works in somewhat funny ways, and the version we use is a relatively old one that has been mostly ported as-is from Java. This leads to some design decisions that are questionable (for example, using exceptions for control flow in parsing queries), or just awkward (by default, an error in merging segments will kill your entire process). Getting Lucene to run properly in production takes quite a bit of work and effort. So I don’t like Lucene. We have spiked various alternatives to Lucene multiple times, but it is a
hard problem, and most solutions that we look at lead toward pretty much the same approach that Lucene does it.By now, we have been working with Lucene for over eight years, so we have gotten good in managing it, but there are still quite a bit of code in RavenDB that is decided to managing Lucene’s state, figuring out how to recover in case of errors, etc. Just off the top of my head, we have code to recover from aborted indexing, background processes that takes regular backups of the indexes, so we’ll be able to restore them in the...(Read whole news on source site)

The Morning Brew #2084

AddThis Social Bookmark Button
Information New and Noteworthy Extensions for Visual Studio – April 2016 – Michael Dick shares this month’s round up of some of the best new extensions for Visual Studio 2015, including a look at Visual C++ for Linux Development, and an extension which allows you to order pizza from within the IDE Introduction to .NET […]

Securing Web Applications, Part 4. Account and Session Management Features

AddThis Social Bookmark Button
This blog post explores attacks against some pre-made sample web apps running on your own machine. The focus of this post is on securing web apps, rather than the attacks themselves. It is part of an ongoing series of blog posts on web application security, which includes: Securing Web Applications, Part 1. Man In The Middle Attacks Securing Web Applications, Part 2. SQL (and other) Injection Attacks Securing Web Applications, Part 3. Cross-site Scripting Attacks An important note before starting: This blog post shows how to perform an attack on a sandboxed sample website. Attacking targets without prior mutual consent is illegal.
It is the reader’s responsibility to obey all applicable laws. The writers of this blog post and Scott Logic assume no liability and are not responsible for any misuse or damage caused from the use of this tutorial. What are these attacks? In this module we return to the theme of users having their sessions or accounts hijacked - taken over by an attacker. We saw this in previous modules in the context of insecure transport of credentials and session IDs, and in exfiltration of credentials by injection attacks. However, there are many other ways of taking over a user’s account, based on...(Read whole news on source site)

SQL SERVER – Q&A: SQL Clustering Virtual Server Name and Instance Name

AddThis Social Bookmark Button
Of late some of the troubleshooting scenario I am getting involved is amazing. Though some of them are complex, it gives me a unique opportunity to learn and try something new to share later with you folks. Recently I was contacted by a team who takes care of SQL installations. Since they are very new to SQL Server cluster installation and had basic questions. Let us learn more about SQL Clustering. The post SQL SERVER – Q&A: SQL Clustering Virtual Server Name and Instance Name appeared first on Journey to SQL Authority with Pinal Dave.

ng-conf in Salt Lake City

AddThis Social Bookmark Button
This week I will be in Salt Lake City for ng-conf, the World's Original Angular Conference.You can follow the conference without being there:Download the appAndroidiOSAttend a local event in your city ng-conf 2016 extended:
https://www.ng-conf.org/#/extendedWatch the live streams on YoutubeDay 1    https://www.youtube.com/watch?v=mAjjI35RcUE
Day 2    https://www.youtube.com/watch?v=bSssb9AmiJU
Day 3    https://www.youtube.com/watch?v=kJ6LVmQ6z0M
This promises to be fantastic!

Blackstar, the API-first, headless CMS built for developers

AddThis Social Bookmark Button
Managed content in custom applications is useful, but building applications inside of a CMS is unproductive and miserable. Blackstar CMS is an API-first, headless CMS, built for application developers. I recently wrote that Hosting a custom application inside of a CMS is a terrible idea. Now, I present a solution. Blackstar CMS is an API-first, headless CMS, built for application developers. It allows you to put content in your custom web application, and provide a delightful content management experience for application administrators. Blackstar CMS is currently in alpha preview. To access the alpha, signup for the Blackstar CMS newsletter
below:
Newsletter
A tour of Blackstar CMS An application using Blackstar CMS to embed managed content might look something like this: If I, as an application administrator, want to change the main heading, I click its edit link, and am taken to the blackstar edit...(Read whole news on source site)

Home