Browse by Tags

Tagged Content List
  • Wiki Page: Architecting High Performance Enterprise Class Application in WPF 4.5

    Normal 0 false false false false EN-IN X-NONE X-NONE ...
  • Wiki Page: Factors need to considered for enterprise class application with WPF/Silverlight

    _______________________________________________________________________________________________________________________________________________________________________________________________ There are various factors that need to consider while building enterprise class applications in WPF. It’s...
  • Wiki Page: Private Cloud Security Challenges - Rapid Elasticity

    Table of Contents Security Functionality Infrastructure Security Software Security Management Security Legal Issues As a designer of a private cloud solution, I am concerned that a rogue application, client, or DoS attack might destabilize the data center by requesting a large amount of resources...
  • Wiki Page: what microsoft promises to offer in .NET 5.0

    Introduction of New Features in C# 5.0 1. C# Evolution Matrix Microsoft just published a new version of C# : 5.0 beta with CLR version 4.5 (Visual Studio 11 beta). In order to get a big picture of the whole evolution of C# language, I summarized all the key features into a C# Evolution Matrix...
  • Wiki Page: WPF Xaml datagrid by Infragistics

    xamDataGrid is UI component for .NET WPF applications developed by Infragistics , which can provides rich UI grid interface for you data. you can bind this control to ObjectDataProvider and XmlDataProvider. Main Features of this control: You can bind this control with all WPF data providers...
  • Wiki Page: New and Much Awaited Visual Studio 2012 with .NET 4.5 Features

    Table of Contents #1) Develop for Windows 8 #2) Develop for the Web #3) Develop for Windows Phone 8 #4) Develop for Windows Azure #5) Develop Business Applications #6) Develop Games and other 3D Applications #7) Take advantage of the latest language advancements #8) Performance, Reliability, and Compatibility...
  • Wiki Page: Understanding Garbage Collection from enterprise Perspective

    Advance Memory Management Caching objects Keep all the objects like view Model objects, Model objects, business objects, static objects etc.. in a centralized Cache. Disposing centralized cache can promote greater memory reductions. Microsoft provides built-in Cache in .NET runtime, but...
  • Wiki Page: Private Cloud Security Design Principles

    Table of Contents Apply Generic Security Best Practices Isolation is Key Consider Security as a Wrapper Assume Attackers are Authenticated and Authorized Assume All Data Locations are Accessible Do Not Trust Client Information Use Established Strong Cryptographic Techniques Automate Security Operations...
  • Wiki Page: Private Cloud Security Model - Infrastructure Security

    Table of Contents Physical Security Energy Supply Security Facility Security Network Security Hardware Security Compute Security Storage Security Operating System Security Virtualization Security Update Security Now that you have examined the factors within the security wrapper, this paper presents...
  • Wiki Page: Cloud Security Challenges

    To highlight the changes in security between traditional IT systems and cloud-based environments, this paper takes four of the five the NIST cloud computing definitions and analyses these statements to create a problem statement and a range of possible attack vectors. This paper considers each of these...
  • Wiki Page: Private Cloud Security Model - Wrapper Functionality

    As discussed earlier in this paper, the private cloud must implement security as a wrapper. Every transaction then must pass through this security wrapper on any data transition within the cloud, for example: Client to the service delivery layer Service delivery layer to the software...
  • Wiki Page: Defining the Private Cloud Security Problem Domain

    As previous sections in this document outline, security is a universal component of cloud service provisioning. To help consider this requirement logically, this series considers the key security differences in private cloud environments, which result from the unique features of a cloud-based service...
  • Wiki Page: Software to Services - A Journey by Microsoft

    Microsoft recently transformed the strategic direction of the company by expanding its already extensive software products and cloud services capabilities as part of the process of establishing itself as a major cloud services provider. Microsoft Services describes key elements of that paradigm change...
  • Wiki Page: SharePoint 2010 Architectures

    SharePoint Server 2010 comprises of three architecture areas that are inter-related in the design and deployment of implementation. Physical Architecture Hardware configuration broken down into a three tier model: - Web Front End for web applications. - Application for managing and serving...
  • Wiki Page: Operations Guide for A Solution for Private Cloud Security

    Welcome to this third paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the operations perspective and offers guidance for operating security within a private cloud environment. In some areas, specific products are discussed in relation to the security...
  • Wiki Page: Measured Services Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution, what can I do to ensure that only legitimate users are using the private cloud resources? Security Functionality Part of the answer to the question above is addressed in the On-demand Self-Service section earlier in this paper. That section discussed...
  • Wiki Page: Rapid Elasticity Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution: How do I detect and respond to requests for resources that might negatively impact other tenant applications or the whole cloud? What impact does the private cloud have on my plans to maintain the availability and capacity of resources? ...
  • Wiki Page: On Demand Self Service Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution: How do I monitor and audit the use of the services hosted in the cloud? If I don't know what I've got, how do I make sure that it's secure? What happens if the wrong people request or de-provision resources? How does the private cloud...
  • Wiki Page: Broad Network Access Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution, I want to be sure that an appropriate level of security applies regardless of where the client is connecting from and regardless of the device form factor. This requirement applies to both cloud management and application security. Security Functionality...
  • Wiki Page: Resource Pooling Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution: How can I detect any breaches in isolation between tenants' resources and how do I respond to the situation? How do I design my disaster recovery procedures to ensure isolation? What impact does the private cloud have on my plans for maintaining...
  • Wiki Page: Private Cloud Security Operations Principles

    This section introduces the key operational security principles for private clouds. These principles apply to all the detailed security design recommendations that are discussed in subsequent sections. Note: In the following discussions, we use the term "tenant" to refer to a client or...
  • Wiki Page: Private Cloud Security Challenges - Measured Services

    As a designer of a private cloud, I want to want to ensure that all applications and services running in the cloud are measured and accounted for. Security Functionality Figure 1 lists a number of security capabilities that the security wrapper should include in the private cloud such as...
  • Wiki Page: Private Cloud Security Challenges - Broad Network Access

    As a designer of a private cloud solution, I want my solution to provide appropriate authentication and authorization services for the broad range of users accessing the cloud. Different services have different security requirements, such as different levels of security, access from multiple locations...
  • Wiki Page: Private Cloud Security Challenges - Resource Pooling

    As a designer of a private cloud solution that uses a pool of resources that can be allocated to many different tenants, how can I ensure the proper isolation of resources (network, compute, memory, storage) between tenants? Security Functionality Figure 1 lists a number of security capabilities...
  • Wiki Page: Private Cloud Security Challenges

    The previous section outlined the cloud security design principles that should apply at all levels of the private cloud design. This section examines the key attributes that characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured...
Page 2 of 3 (56 items) 123
Can't find it? Write it!