Stephen Covey Is Building An Online Community Of Highly Effective People
Stephen Covey wants you! He seeks to build the network of like-minded highly effective people. Following JD’s coverage on Stephen Covey Speaks at Microsoft I discovered that Stephen Covey is building...
View ArticleArticle: Consulting Guidelines For High Energy and Burnout Prevention
Consulting Guidelines For High Energy and Burnout Prevention article is out. The article’s objectives: State the risk of the burnout Rationalize the need for high energy List guidelines for...
View ArticlePerformance Test Success Criteria
Poor performance test design leads to expensive decisions or mismatch between the results and real usage in other words to irrelevancy. Stephen Covey says “Begin with the End in Mind” in his book The 7...
View ArticlePerformance Rule: Image Loading Early vs. Late
Simple and practical rule for image loading based on the Ultra-Fast ASP.NET 4.5 by Rick Kiessig. The rule is driven by where the images located on the page with regards to the fold (the lower border of...
View ArticleWindows Azure Telemetry and Diagnostics Resources
Below is the list of resources that could be useful for implementing telemetry and diagnostics for cloud deployed application. Announcing the EventSource NuGet Package – Write to the Windows Event Log...
View ArticleAgile Security: Test Case To Identify Input and Data Validation Vulnerabilities
Improper input validation or lack of it introduces vulnerabilities in the code that allow successful injection attacks of different kinds. If your code exposes publically available web services and web...
View ArticleEncrypting SQL Server Data Using TDE
Consider encrypting the data at rest managed by SQL Server when mitigating the threat that someone can take the data from the server and load it on another. For example, you upload your SQL Server VM...
View ArticleEncrypting SQL Server Traffic With SSL
Do you protect HTTP traffic with SSL? If yes, then consider protecting your TDS (SQL Server) traffic with SSL too. Even though the SQL Server may well sit behind firewall on high trust network,...
View ArticleEncrypting SQL Server Data Using EFS
Consider encrypting the data at rest managed by SQL Server when mitigating the threat that someone can take the data from the server and load it on another. For example, you upload your SQL Server VM...
View ArticleMonitor SQL Server TDS Traffic Using Microsoft’s Free Netmon
Did you know by default the commands and the data are sent to and from SQL Server in clear text? Curious what’s going on the wire between your app and SQL Server? Want to investigate SQL Server...
View ArticleAgile Security: User Stories
Applying agile development practices to security gains all the benefits (and challenges too) that come with agile. Namely, it’s the ability to build manageable backlog of work items, delivering working...
View ArticleScript: Verifying File’s Copyright Using PowerShell
When you ship your software you want to make sure the binaries have proper copyright attributes set. Below is a PowerShell script that extracts the file copyright attribute. Hat tip to June...
View ArticleScript: Validate File’s Authenticode Signature Using PowerShell
Authenticode digital signatures provide means of verifying the code’s origins. When you ship your production files consider signing them with Authenticode, even those .Net assemblies that you already...
View ArticleScript: Validate Assembly’s SNK Using PowerShell
SNK (Strong Name Key) is a digital proof of .Net assembly’s origin, normally it proves it belongs to your company. If it’s important for you to be sure your customers using your assemblies and that the...
View ArticlePerformance: High CPU–The Case of Lack Of Caching And Dynamically Generated...
During the latest load test we observed high CPU in our front end SharePoint servers. The servers host custom pages and under increasing load we observed ever increasing CPU utilization. The...
View ArticlePerformance: Slow Response–The Case Of Slow DNS Translation
During recent load testing we observed slow response with one of key web pages. Regardless of the load – single user or multiple users – the response time wasn’t of satisfactory and varied between 8 to...
View ArticleASP.NET MVC–Key Components And Their Relationships
This post outlines key components of ASP.NET MVC and their connections. This is helpful for those who are getting started with ASP.NET MVC especially to those who are transitioning from ASP.NET Forms....
View ArticlePerformance Engineering–Value Realization, and Risk Mitigation
Here is my view what’s valued in software engineering, it’s crisp and it helps me gauging my impact. So here it is – you are valued when you either create value or reduce risk. Feature teams obviously...
View ArticlePerformance Test Cadence
Wouldn’t you want to know about problems earlier vs. later?How often one should perform performance testing? Is it once successful build is available? Is availability of a good build a trigger to run...
View ArticlePerceived Performance – Customer Driven Performance Testing
How to get the most from the performance testing? Performance testing could be laborious, fragile, complex process that requires special skills to get it up and running. It requires even deeper skills...
View Article
More Pages to Explore .....