Visual studio feeds

All Visual Studio blogs in one place

Subscribe

Enter your email address:

Delivered by FeedBurner

Increase your website traffic with Attracta.com

Google+

Contact

Email:
Subject:
Message:
Anti-spam: How many eyes has a typical person?

Follow us on FB

Search

McKinsey Digital Practice | Digital Quotient | McKinsey & Company

AddThis Social Bookmark Button
What it takes to build your Digital Quotient | McKinsey & Company



Raising your Digital Quotient | McKinsey & Company



Our examination of the digital performance of major corporations points to four lessons in which we have increasing confidence:


First, incumbents must think carefully about the strategy
available to them. The number of companies that can operate as pure-play
disrupters at global scale—such as Spotify, Square, and Uber—are few in
number. Rarer still are the ecosystem shapers that set de facto
standards and gain command of
the universal control points created by
hyperscaling digital platforms. Ninety-five to 99 percent of incumbent
companies must choose a different path, not by “doing digital” on the
margin of their established businesses but by wholeheartedly committing
themselves to a clear strategy.Second, success depends on the ability to invest in relevant
digital capabilities that are well aligned with strategy—and to do so at
scale. The right capabilities help you keep pace with your customers as
digitization transforms the way they research and consider products and
services, interact, and make purchases on the digital...(Read whole news on source site)

What is Azure Stack? | Build Azure

AddThis Social Bookmark Button
What is Azure Stack? | Build Azure



when Azure Stack hits General Availability (GA) release is fairly large for an initial release.


Here’s a list of the Azure Stack features coming in GA:


Compute – Virtual Machine (including extensions & availability sets), Service FabricData & Storage – Blobs, Tables, QueuesNetworking – Virtual Network, Load Balancer, VPN GatewayMgmt. & Security – Microsoft Azure Portal, Key VaultWeb & Mobile – App Service (Web Apps, Logic Apps, Mobile Apps, API Apps)Developer Services – Azure SDK

Securing Web Applications Against Man In The Middle Attacks

AddThis Social Bookmark Button
Robin Sillem, William Ferguson This blog post explores performing man in the middle (MITM) attacks on your own machine, on some pre-made sample web apps. The focus of this post is on securing web apps, rather than the attacks themselves. An important note before starting: This blog post shows how to perform an attack on a sandboxed sample website. Attacking targets without prior mutual consent is illegal. It is the reader’s responsibility to obey all applicable laws. The writers of this blog post and Scott Logic assume no liability and are not responsible for any misuse or damage caused from the use
of this tutorial. Session Hijack A session hijack is where you have a session - an ongoing HTTP conversation - with a website, and an attacker gains access to this session, communicating with the site as if they were you. You may or may not be aware that the attacker is using your session. The session may or may not be authenticated, but it is likely that it is if any sensitive information is involved. This means that the attacker can do what ever you can on the site in question at the time of the hijack - change your password, read...(Read whole news on source site)

Trends for 2016

AddThis Social Bookmark Button
Our world is changing faster than ever before.  It can be tough to keep up.  And what you don’t know, can sometimes hurt you. Especially if you get disrupted. If you want to be a better disruptor vs. be the disrupted, it helps to know what’s going on around the world.  There are amazing people, amazing companies, and amazing discoveries changing the world every day.  Or at least giving it their best shot. You know the Mega-Trends: Cloud, Mobile, Social, and Big Data. You know the Nexus-Of-Forces, where the Mega-Trends (Cloud,
Mobile, Social, Big Data) converge around business scenarios. You know the Mega-Trend of Mega-Trends:  Internet-Of-Things (IoT) But do you know how Virtual Reality is changing the game? … Disruption is Everywhere Are you aware of how the breadth and depth of diversity is changing our interactions with the world?  Do you know how “bi-modal” or “dual-speed IT” are really taking shape in the 3rd Era of IT or the 4th Industrial Revolution? Do you know what you can print now with 3D printers? (and have you seen the 3D printed car that...(Read whole news on source site)

Beer IoT: Measuring temperature with Windows 10 IoT Core and Raspberry Pi

AddThis Social Bookmark Button
I have RaspberryPi 2 with Windows 10 IoT Core and I plan to use it for some brewing activities. In this blog post I introduce how to measure temperature with RaspberryPi using DS18B20 thermal sensors. This post is also example about how easy it is to get started with your IoT stuff using Microsoft tooling. The post Beer IoT: Measuring temperature with Windows 10 IoT Core and Raspberry Pi appeared first on Gunnar Peipman - Programming Blog.

Beer IoT: Moving to ITemperatureClient interface

AddThis Social Bookmark Button
My previous blog post “Measuring temperature with Windows 10 IoT Core and Raspberry Pi” introduced you my simple solution for measuring temperatures. In this blog post we go step further and make some modifications to solution architecture so we don’t have to keep sensors connected all the time and as a result we can also emulate temperatures and situations that are not easy to produce in home or office. The post Beer IoT: Moving to ITemperatureClient interface appeared first on Gunnar Peipman - Programming Blog.

If you’re a db, you need to manage CPU / Memory / IO

AddThis Social Bookmark Button
Kelly Sommers had this twit, that caught my attention. While half a minute pause is not something that we have really seen, we have seen production systems that spend a lot of their cycles on GC. That is better than a pause, but only in the same way that you prefer to stab your toe rather than break your leg. As per the title of this post, the most challenging tasks in a database engine isn’t actually how to fetch the data, or how it is stored, but the management of the various resources that are
available. In particular, CPU utilization, memory usage and I/O. Most databases handle I/O pretty much from the get go, because it is such a painful topic. And it is relatively easy and obvious to see how you need to handle CPU allocations. But memory is tricky. It is tricky because you typically want to share as much of it as possible, to reduce memory usage, except you don’t, because of thread safety and “is someone still using that?” issues. The GC is a really great invention in this regard, because you can offload all of this behavior (well, not the...(Read whole news on source site)

The Morning Brew #2021

AddThis Social Bookmark Button
Software Microsoft Azure Stack Technical Preview is now available for download | Microsoft Azure Blog – The Microsoft Azure Stack Team announces the availability of downloads of the Azure Stack Technical Preview Information What I’ve learned about .NET Native – Mark Rendle continues his discussion of the running the .NET Core on Linux, taking a […]

Home