- Debugging Django with Aptana | CodeSmart, Inc. on Running Django in IIS7/IIS8
- iminfense on Silverlight 4 – 070-506 Exam… Passed!
- trade show displays on Leveraging OData end-points in JSON format with JQuery
- Española Lawyers on Leveraging OData end-points in JSON format with JQuery
- death records on Leveraging OData end-points in JSON format with JQuery
TagsAdaptive Design AJAX Android ASP.NET MVC 3 Building Search Filters Certification Django Django in IIS EF Entity Framework Fiddler2 Gotchas Hacking HTML5 INotifyPropertyChanged IPMA JQuery JSON Mobile MONO MONO for Android OData PHP PropertyChanged Python RDLC Responsive Design RIA Services Toolkit Security Setup and Configuration Silverlight Silverlight 4 SQL SQL Injection SQL Server SSRS Table Value Parameters Technology Philosophy Testing Training WAMP WPF XAML
So I’ve been working hard on Python and Django training materials lately. There’s a client that was in desperate need of somebody to provide this type of training, and I was fortunate enough to have an experienced Python/Ruby programmer on staff that fit the bill. He and I worked together to come up with plenty [...]
Best practices for semantic data-modeling for performance and scalability. CodeSmart Inc’s “must read” white-paper from Microsoft.
These videos (3 in total) will explain how it is done. They will be using a relatively simple T4-template that I’ve implemented specifically for the .NET 4.0 version of Entity Framework. The T4-Template is written to support basic CRUD operations against a single collection of table-related classes. The T4-Template doesn’t do much in the way of supporting the necessary operations to track related entities in JSON that come back from the WCF Domain Service query.
While presenting at the IPMA, I demonstrated to the 150+ person audience how easy it is to hijack another user’s credentials within an ASP.NET MVC 3 application that hasn’t been vetted for coding-practices. In this article, I will show a video of me re-demonstrating that attack, exactly how to fix it, and post the source-code [...]
Today, I delivered a basic 3-hour session on areas to focus on when hardening security in WA State Agencies. I mainly focused the first half of the presentation on common best-practice methods like clear lines of communication between Project Managers and Network, Security, and Database Administrators as well as practicing good coding practices such as peer-programming, code-reviews, and the like. I finished off the first 2 hours be demonstrating the use of Fiddler2 and how it could be used to probe, and then attack an ASP.NET MVC application.
The files for the last day! My next post will go into a bit more detailed description of each of these. This was the final day of introductory training for Washington State agency I.T. staff on Silverlight 4. Training today covered offline disconnected Data queries, Unit-Testing asynchronous methods, working with Effiproz, leveraging COM Interop and [...]
The first day of Silverlight 4 training took a slight deviation from the original agenda. Based on a “show of hands”, I decided to delve into a 1-hour session on the basics of creating XAML and what Silverlight is meant to do. I also discussed where its getting competition from and how it should fit into [...]