Workflow Services – Using Message Contracts

Overview When building workflow services, very often we need to leverage pre-existing contracts (service contracts, message contracts and data contracts). In the current version of Workflow Services (WF4) we can reuse data contracts and message contracts. In vNext (as Ron Jacobs demonstrated in PDC2010), we will be able to reuse Service Contracts too. This post…


Building a Windows Phone 7 game, with SharePoint communication

So, you’ve never made a game before for the Windows Phone 7 – you’ve opened up your brand new Visual Studio 2010, with the Windows Phone 7 developer tools; but you don’t know what to do, or how to get started. This is the situation that both myself (Michael Tsikkos) and James Glading faced at…


Microsoft Online Cloud Conference: the TechDays team goes online

Don’t forget to check out the "Lap around App Fab" session by Santosh Benjamin. What: Microsoft Online Cloud Conference: the TechDays team goes onlineMake a date in your diary for the first free @techdays online conference, showcasing everything you should know about the Windows Azure Platform. You’ll have access to three virtual rooms full of…


The Cool Wall is Back

For those of you who are fans of the BBC show Top Gear, you may remember the Cool Wall, and now you can get your very own Cool Wall along with the launch of IE9 beta and BBC’s Top Gear site. I have been very fortunate to be a member in the team within UK…


Adventures in TSQL: Using CTEs when performing UPDATE operations

In a recent post I discussed using CTEs for managing ordered DELETE operations. Adventures in TSQL: Using CTEs when performing DELETE operations However CTEs are also useful for ordered UPDATE operations, as I will hopefully show in this post. One of the limitations of UPDATE TOP() statement is that an ORDER BY cannot be specified….


Debugging the .NET framework source code

I am sure lots of us have been in the situation where, after hours of poring through compiled source code in Reflector whilst simultaneously trying to hold the values of hundreds of conspiratorial variables in our heads, we are left thinking that it would all be so much easier if we could just set a…


U-Prove and why U should care

Privacy and minimal disclosure of information are important aspects of any identity verification system. However, end-users are often unaware of exactly what information is being disclosed to online service providers. The U-Prove protocol has been devised to resolve these problems by putting into the hands of the end-user the control of what information is passed…