Robert Hurlbut Blog

Thoughts on Software Security, Software Architecture, Software Development, and Agility

WCF and Security solutions

6/14/2006 Comments

 .NET    ArchitecturePatterns    Security    Service Orientation (SO)    Smart Clients    WCFIndigo    Web Services   
Read more

WCF Code Library from IDesign

6/13/2006 Comments

 .NET    ArchitecturePatterns    Service Orientation (SO)    WCFIndigo   
Read more

TechEd 2006 this week

6/12/2006 Comments

 .NET    ArchitecturePatterns    Books    Database Development    Personal    Security    Service Orientation (SO)    System.Transactions    WCFIndigo    Web Services   
Read more

RC1 for Threat Modeling tool available

5/26/2006 Comments

 .NET    ASP.NET    Security   
One of my talks at the New England Code Camp 5 was "Threat Modeling for Web Applications". At the end of the talk, I did a demo showing the new Threat... Read more

Resources from recent talks

5/25/2006 Comments

 .NET    Database Development    Personal    Security    Speaking    System.Transactions   
Read more

Working, speaking, and generally busy

5/5/2006 Comments

 .NET    ArchitecturePatterns    ASP.NET    Database Development    Personal    Security    Smart Clients    Speaking    System.Transactions   
Read more

BoF session for voting: Developing as a Non-Administrator in XP and Vista

3/31/2006 Comments

 .NET    Personal    Security    Speaking   
A little late (voting ends today at 5:00 pm), but I have submitted a Birds of a Feather (BoF) session for TechEd 2006:Developing as a... Read more

Rotor 2.0 released

3/24/2006 Comments

 .NET    CLR    Personal    Rotor   
This is great news! The much awaited (by myself and many others) release of Rotor 2.0 has been released. Get it here.Here is what is new:- Full... Read more

WCF and Federation security options

3/15/2006 Comments

 .NET    Security    Service Orientation (SO)    WCFIndigo   
Read more

Threat Modeling blog

2/27/2006 Comments

 .NET    ArchitecturePatterns    ASP.NET    Security   
The Microsoft ACE Team has put together a specific blog on Threat Modeling [found again (again as inI can't remember where I saw the original link... Read more

Pages: 1  2  3  4  5  6  7  [8]  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56