Follow TechEd Events Online

TechEd North America today begins in Los Angeles for developers and ITPros. You can expect announcements across several product lines. You can view the keynote this morning online and follow sessions at Microsoft Tech-Ed Online. For example, as the Windows Mobile team has announced on their blog, the official debut of Windows Mobile 6.5. See…


Tool Analyzes Your Crashes to Determine Security Exploits

!exploitable Crash Analyzer, a tool that helps you identify security holes in your software, has been released by the Microsoft Security Engineering Center. The release includes source code and binaries for both x86 and x64. “!exploitable” is pronounced “bang exploitable”. The program is a Windows Debugger extension that identifies crashes that occur during application development and testing and…


Azure Issue Tracker Sample Application Demonstrates Multi-tenant ISV, SaaS Solutions.

Azure Services Evangelism team is pleased to announce the release of the Azure Issue Tracker sample application.  This demo is appropriate for demonstrating multi-tenant ISV, SaaS solutions.  Two releases have been announced. A Standard version shows federation with Windows LiveID users, integration with SQL Data Services, and the core claims-based authorization model and architecture using…


Updated Windows Live Offers Your Customers New Ways to Share Information

At the Consumer Electronic Show (CES) this week, Steve Ballmer made a very significant announcement: the availability of the new version of Windows Live.  The new Windows Live is designed to make it much easier to communicate and share experiences with the people you care about, and stay connected to the content and information that…


How to Build Silverlight Business Applications Across Networks

Enterprise-class applications being built by ISVs require secure delivery of line-of-business (LOB) information across network boundaries. They are often provided over the Internet and require a role-based user interface and data trimming applied for the business context. Silverlight and .NET Framework 3.5 supplies excellent capabilities for building such scalable and secure LOB applications. The lightweight Silverlight runtime…


Microsoft Code Name ‘Geneva’ Moves Identity to the Cloud

One of the hottest topic for ISVs is identity. The ability to identify a user and provide the correct details for that user is a challenge all ISVs face. ISVs need a federated identity, an identity that you can get from your customers. You need to be able to use that identity regardless of whether…

1

Must See PDC Sessions for ISVs

Microsoft PDC is coming next week. I’ve spent several days in the last couple weeks watching many of the practice sessions. Here’s my list of must-see sessions that apply to ISV decision makers and architects. In my opinion, there are several important themes for ISVs: Cloud Services. How should you build next generation applications for…


Workflows Added to BizTalk Services CTP

BizTalk Services provides a way to connect multiple service-enabled applications in the cloud. The latest community technology preview (CTP), R12, adds workflow enabled service orchestration. A hosted Windows Workflow Foundation runtime and Web services messaging are featured in R12. You could, for example, set up an automated process that uses Web services to provide pricing information…

1

Oslo Roadmap Described in eWeek Article

eWeek.com provides an insight into the Oslo and how the initiative relates to cloud computing. You can read the article at Oslo: Road to Microsoft’s Cloud. But I’ll summarize key points of interest to ISVs here. Oslo is built around service oriented architecture (SOA) and adds core modeling technology. The products involved in Oslo are…


Claims-Aware Identity Framework Extension Preview Released for Your WCF, ASP.NET Applications

An extension to .NET Framework 3.5, Code-named Zermatt, helps you more easily build applications that incorporate a claims-based identity model for authentication and authorization. Claims are a set of statements that identify a user and provide specific information such as title or purchasing authority. Zermatt uses standard protocols such as WS-Federation, WS-Trust, and Security Assertion…