Archives for Software Dev - Page 24
Hub Spoke diagram in Visio
On the File menu, point to New, point to Business, and then click Marketing Charts and Diagrams. From Marketing Diagrams, drag a Circle-spoke diagram shape onto the drawing page. Choose…
load balancers general SSL
Load balancers are ubiquitous. Most of us encounter them as the internet facing part of a server farm (usually a web server farm). Server Farms One of the most commonly…
Dual Factor in ASP.NET and Azure AD
On-Premises Application – MFA as built-into the application To perform a multi-factor authentication for on premise applications, you need your application to redirect authentication to a service (MFA service) that…
High level architecture versus High level design
Architecture and design are closely related. Architecture is more abstract and is geared towards strategy, structure and purpose. High Level Design is more hands-on and geared towards implementation and practice.
Preventing your next application from becoming obsolete (in a hurry)…
The development landscape has changed rapidly in the past decade. NoSQL databases, Javascript libraries, Mobile Computing and other technologies have changed the traditional development lifecycle including, changing the end-game. The…
image2docker–getting older ASP.NET webforms apps onto newer OSes
Image2Docker may be the simplest path for getting your older .NET apps working on newer ; It works by extracting either an entire VM or specific 'artificats' from a ;…
What’s NEW in MVC 6.0?
These are some of the bigger changes in MVC 6 Dependency injection built in Cloud optimized versions of MVC, Web API, Web Pages, SignalR, and EF MVC, Web API and…
VPN–Tunnel essentials
Types of Tunnels - Site to Site or Network to Network VPNs can be either remote-access (connecting a computer to a network) or site-to-site (connecting two networks). In a corporate…
How the Internet Works
Company A = large communications provider. Has a PoP (Point of Presence) in each major city. Company B = large corporate with multiple buildings - lays out it's own fiberoptic…
Group Policy Preferences Security Hazards
Domain machines periodically reach out and authenticate to the Domain Controller utilizing the Domain credentials of the logged-in user (these can be, and often are, unprivileged accounts) and pull down…