This is a mirror of official site: http://jasper-net.blogspot.com/

Top 10 TED Talks of 2011 To Inspire Tech Startups

| Thursday, January 5, 2012
Startup folks, looking for inspiration for 2012? TED talks are an awesome source of inspiration. I listen to them on road trips while the kids are sleeping, and I started keeping a list of the talks that were most inspiring to me as an entrepreneur.


10. Salman Khan: Let's use video to reinvent education

Khan recounts his story: recording math videos to tutor his cousins, he stumbles upon an opportunity to change the future of education. Inspires us to believe that there is great latent opportunity in everyday situations and that by being creative, working hard, and focusing on helping people we can capitalize on it.

9. Tim Harford: Trial, error and the God complex

This talk covers complex systems that evolve through trial-and-error. Though you don't often hear much about trial-and-error in the creation mythology of a successful company (there's more mention of cocaine in The Social Network), trial-and-error development is the process of doing a startup. What can you learn about it from Tim Harford?

Read more: Mark Soper's Blog
QR: Top-10-TED-Talks-of-2011-to-Inspire-Tech-Startups.html

Posted via email from Jasper-net

UI Automation overview

|
Introduction

Microsoft UI Automation is the new accessibility framework for Microsoft Windows. It addresses the needs of assistive technology products and automated test frameworks by providing programmatic access to information about the user interface (UI). In addition, UI Automation enables control and application developers to make their products accessible.
UI Automation provides programmatic access to most user interface (UI) elements on the desktop, enabling assistive technology products such as screen readers to provide information about the UI to end users and to manipulate the UI by means other than standard input. UI Automation also allows automated test scripts to interact with the UI.
UI Automation provides full functionality in Windows Vista, Microsoft Windows XP, and Windows Server 2003.


Who will use UI Automation?

The latest research study, commissioned by Microsoft and conducted by Forrester Research, shows that 57 percent (74.2 million) of working-age computer users (aged 18-64) in the U.S. are likely to benefit from using accessible technology. The research also confirms that the number of people who could benefit from accessible technology is increasing rapidly as the global population grows older and more people experience age-related difficulties and impairments related to vision, hearing and dexterity.
UI Automation is divided into two branches: UI Automation Providers and UI Automation Clients. UI Automation providers are applications such as MS Word, Excel, or any other program which can be used by users who need accessible technology support. UI Automation Clients are assistive technology applications, such as screen readers, screen enlargers,alternative input or others. Automated test scripts can use UI Automation for automated testing and are also considered clients in the UI Automation model.

How will this help assistive technology developers?

With current technology, assistive technology developers are required to use many different approaches to obtain and present information about the UI to computer users who rely on assistive technology products. These developers therefore spend an inordinate amount of time and resources gathering the UI information required for their application instead of spending this time innovating in their feature set. UI Automation reduces the cost for these developers by delivering the most complete accessibility model in the industry. It will become the primary source of UI information for the next generation of assistive technology products.


UI Automation Model

UI Automation exposes every piece of the UI to client applications as an AutomationElement. Elements are contained in a tree structure, with the desktop as the root element. Clients can filter the raw view of the tree as a control view or a content view. (These standard views of the structure can be easily seen using the UI Spy application). Applications can also create custom views.
AutomationElement objects expose common properties of the UI elements they represent. One of these properties is the control type, which defines its basic appearance and functionality as a single recognizable entity: for example, a button or check box. There are special helper classes and methods, that allow to obtain any UI element as AutomationElement object. So you can find any element you need by name, type, id, etc. walking through the tree.
In addition, elements expose control patterns that provide properties specific to their control types. Control patterns also expose methods that enable clients to get further information about the element and to provide input.
There is no one-to-one correspondence between control types and control patterns. A control pattern may be supported by multiple control types, and a control may support multiple control patterns, each of which exposes different aspects of its behavior. For example, a combo box has at least two control patterns: one that represents its ability to expand and collapse, and another that represents the selection mechanism.
UI Automation also provides information to client applications through events. Unlike WinEvents, UI Automation events are not based on a broadcast mechanism. UI Automation clients register for specific event notifications and can request that specific UI Automation properties and control pattern information be passed into their event handlers. In addition, a UI Automation event contains a reference to the element that raised it. Providers can improve performance by raising events selectively, depending on whether any clients are listening.


Read more: ArtfulBits
QR: UIAutomation1.aspx

Posted via email from Jasper-net

Understanding the x64 code models

|
An interesting issue that comes up when writing code for the x64 architecture is which code model to use. This probably isn’t a very well-known topic, but if one wants to understand the x64 machine code generated by compilers, it’s educational to be familiar with code models. There are also implications for optimization, for those who really care about performance down to the smallest instruction.

There’s very little information on this topic online or anywhere. By far the most important resource is the official x64 ABI, which you can obtain from the x86-64.org page (from now on I’m going to refer to it simply as "the ABI"). There’s also a bit of information in the gcc man-pages. The aim of this article is to provide an approachable reference, with some discussion of the topic and concrete examples to demonstrate the concepts in real-life code.

An important disclaimer: this is not a tutorial for beginners. The prerequisites are a solid understanding of C and assembly language, plus a basic familiarity with the x64 architecture.


Code models – motivation

References to both code and data on x64 are done with instruction-relative (RIP-relative in x64 parlance) addressing modes. The offset from RIP in these instructions is limited to 32 bits. So what do we do when 32 bits are not enough? What if the program is larger than 2 GB? Then, a case can arise when an instruction attempting to address some piece of code (or data) just can’t do it with its 32-bit offset from RIP.

Read more: Eli Bendersky's website
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://eli.thegreenplace.net/2012/01/03/understanding-the-x64-code-models/

Posted via email from Jasper-net

HOLY CRAP. nearly all nodejs http servers are vulnerable to DoS and apparently, the V8 guys seem to not care much

|

Technical explaination 0m-19m or so, part about nodejs at 40m or so.

Basically, because v8 uses weak hashes for objects, you can fill up one slot of the hashtable with many entries, e.g. using a POST containing a querystring with many keys with the same hash. Operating on those keys (inserting and reading) then becomes slow as hell which allows you to bring a nodejs server to 100% CPU usage for a long time (blocking the event loop completely) with one moderately large POST request. This is bad.

Those guys say they told Google October 18th, they got through to the v8 guys in November, and they said they don't care sooo much about DoS attacks on v8 because they're mainly interested in browserside stuff.

This is bad for us.

Read more: Google Groups
QR: d34ed2ec3526db5a?pli=1

Posted via email from Jasper-net

HTML5 for Silverlight Developers

|
Let’s say you are in love with Silverlight, .NET and the power of Visual Studio. Then one day you hear the world talking about HTML5 all at once. Why? What’s that thing? In this session you will understand what HTML5, CSS3 and ECMAScript 5 are through the lens of a XAML and C# developer. You will learn to use the best of both worlds to build your next beautiful applications. Expect a lot of technical demo and samples!

Read more: Channel9
QR: HTM14

Posted via email from Jasper-net

Logon Triggers

| Wednesday, January 4, 2012
בפוסט זה אציג בתחילה בצורה כללית את Logon Triggers, את שימושיו וסוגיו השונים ולאחר מכן אציג מספר קטעי קוד קצרים המיישמים אותו בפועל. ולבסוף אציג את מגרעותיו ומספר טיפים קצרים לשימוש נבון בו.

אז ככה, מגרסת 2005 ומעלה SQL Server הציגו לעולם את הפיצ'ר שנקרא  Logon Triggers שנועד לעזור לנו לשלוט בצורה סינכרונית (הסבר מפורט בהמשך…) על מספר המשתמשים ברגע נתון ב- Instance מסוים או רק לדעת מי מחובר כרגע. וכמו כן,גם על מספר ה- Sessions  שמריץ כל משתמש. חשוב לציין כי Logon Triggers השונים נכנסים לפעולה אך ורק לאחר השלמת תהליך ההתחברות ל-Instance, אך לפני שהמשתמש פתח Session חדש מול SQL Serve.

איך Logon Triggers פועלים?

השינוי המשמעותי ש- Logon Triggers מקנים לנו המשתמשים הוא בעצם ניטור ושליטה סינכרוניים על תהליך יצירת Sessions. אם תרצו, תוכלו לנטר יצירה של Sessions  בעזרת Trace Event שנקרא: AUDIT_LOGIN. ממש כמו Logon Triggers, הוא מופעל בכל פעם שנוצר Session  חדש במערכת אך לפני תחילתו בפועל(כמובן לאחר תהליך ה- Authentication). הבעיה היא, שלא ניתן לנקוט כל פעולה בעזרת ה- Trace Event בתגובה! ופה בעצם טמון היתרון הגדול של Logon Triggers, הם, בניגוד ל- Trace מאפשרים לנו לפעול בתגובה לאירוע של יצירת Session לפני תחילתו בפועל!! קרי, יכולת לשלוט על מספר המשתמשים וה- Sessions בצורה סינכרונית.

דוגמא מספר 1: Logon Trigger for all connections

עיינו בקוד הבא:

CREATE TRIGGER MonitoringAllConnections

ON ALL SERVER

AFTER LOGON

AS

BEGIN

+ 'PRINT SUSER_SNAME() + ' Just logged to

+ 'UPPER(LTRIM(@@SERVERNAME))+ ' SQL Server at

+ ':LTRIM(GETDATE()) + ' With

()APP_NAME

END

GO


Read more: Madeira
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.madeira.co.il/logon-triggers/

Posted via email from Jasper-net

Why don't ZIP files have the FILE_ATTRIBUTE_COMPRESSED attribute?

|
A customer reported that when they called Get­File­Attributes on a ZIP file, the FILE_ATTRIBUTE_COMPRESSED attribute was not returned. But ZIP files are compressed. Why isn't the FILE_ATTRIBUTE_COMPRESSED attribute being set?

Because FILE_ATTRIBUTE_COMPRESSED tells you whether the file was compressed by the file system. It is not a flag which describes the semantics of the bytes stored in the file. After all, the file system doesn't know that this particular collection of bytes is a ZIP file and contains data that was compressed externally. Who knows, maybe it's just some uncompressed file that just happens to look superficially like a ZIP file (but isn't)?

If a text file consists of the string "ADTUR ADKUH", is this a compressed file? Maybe it's somebody's product key, in which it isn't compressed. Or maybe it is short for "Await instructions before taking further action. Acknowledge receipt of this telegram by wire." That's an example of a commercial code, used to save telegram transmission costs by compressing frequently-used business phrases into five-letter pseudo-words.

The file system doesn't try to figure out whether a particular sequence of bytes it has been asked to store was externally compressed. It just stores the bytes on disk, perhaps after performing its own internal compression, and if that internal compression was performed (even if it didn't actually result in any compression), the FILE_ATTRIBUTE_COMPRESSED attribute is set.

Read more: The old new thing
QR: 10252533.aspx

Posted via email from Jasper-net

10 most popular Android Apps of 2011

|
images-stories-linuxlogos-android-logo-128x141.jpg

   Another year comes to an end today. And the yea was very happening especially when it comes to Android. Google this very year released its first tablet optimized OS the Honeycomb and now by the end released yet another version Ice cream sandwich. There was substantial development on the Android platforms. The Android market was plagued with almost all types of apps. Here we have compiled a list of 10 most popular apps for Android!


Read more: Unixmen
QR: 2026-10-most-popular-android-apps-of-2011

Posted via email from Jasper-net

C#/.NET Network File System (NFS) Server

|
Introduction

This article provides a basic description of an NFS server implemented in C# 1.0. This was written about 8 years ago to address a problem present at the time and also as a vehicle to learn C#. This means none of the collections are generic based plus it's beginner code, so please don't be too critical. It works and has been used in personal production mode though it can get into an erroneous state which can presently only be fixed by restarting the process. Importantly, it supports the creation and use of UNIX Symbolic Links. It does not implement any form of security and is limited to version 2 of NFS and only running over UDP. As such it should be considered a prototype but if there is a need to access a Windows machine via NFS, then it may form a stop-gap solution.

It was quite a long time ago that the research was performed and the code written. Therefore a lot of this article is based on what I can remember and from a quick perusal of the source.

The reason I'm writing this article and making the code Open Source is that recently I had reason to review the NFS Server project. It more or less works and there didn't seem to be a C# Open Source NFS Server available.


Background

I was working on a cross-platform (Windows and many flavours of UNIX) application. The primary development environment was Windows but all the code needed to be compiled and tested on UNIX. The easiest way to accomplish this was to use Linux running on VMWare hosted on a Windows machine. This would allow the virtual Linux machine to access the source code on the primary Windows machine using SAMBA to access a SMB/CIFS share. Unfortunately the build environment for UNIX created symbolic links. These were not supported by either the SAMBA client or SMB. This left three alternatives. Firstly, host the source on Linux and use SAMBA in server mode to share it. This didn't appeal as 8 years ago the resources on the Windows machine weren't sufficient to keep a background VM running all the time. Secondly, a 3rd party NFS server could be used but one wasn't available, at least for a small cost. The final option was to write one, plus it was also a meaty project to test out my C# skills.

Read more: Codeproject
QR: NFSServer.aspx

Posted via email from Jasper-net

Navicat

| Tuesday, January 3, 2012
img3.jpg

Navicat for MySQL is a powerful Database administration and development tool for MySQL. It works with any MySQL Database Server from version 3.21 or above, and supports most of the latest MySQL features including Trigger, Stored Procedure, Function, Event, View, and Manage User, etc.


Features in Navicat are sophisticated enough to provide professional developers for all their specific needs, yet easy to learn for users who are new to MySQL.


With Navicat well-designed Graphical User Interface (GUI), Navicat for MySQL lets you quickly and easily create, organize, access and share information in a secure and easy way, taking MySQL administration.


Navicat for MySQL is available for three platforms – Microsoft Windows, Mac OS X and Linux. It connects users to any local/remote MySQL Server, providing several database utilities such as Data Modeling Tool, Data/Structure Synchronization, Import/Export, Backup and Report, to facilitate the process of maintaining data.

Read more: Navicat
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.navicat.com/en/

Posted via email from Jasper-net

How to Disable “Always ask before opening” Dialog box

| Monday, January 2, 2012
שלום לכולם.

כאן מלח כפיר מצוות יועצי התשתיות של חברת AGILE IT .

רבים מכם וודאי נתקלו כאשר ניסו לפתוח קובץ מצורף למייל מתוך ה- outlook בהודעה ששואלת : האם לפתוח את הקובץ או לשמור אותו ל הכונן?(תמונה 1)

clip_image001_05176868.png

כפי שאתם רואים אין לנו את האפשרות להוריד את הסימון של האופציה הנ"ל ולכן בכל פעם שנפתח קובץ מצורף הוא יציג בפנינו את השאלה ויעלה את רף העצבים שלנו Baring teeth smile

בעיה זו נובעת מה- UAC, אז מה עושים אתם שואלים?

ובכן יש לנו שתי דרכים לפתור את זה: הדרך הראשונה היא לפתוח את ה- Outlook עם הרשאות אדמיניסטרטיביות לפתוח את הקובץ המצורף ולהוריד את ה- clip_image002 , ולאחר בחירה של סוגי הקבצים שיפתחו ללא השאלה אפשר לפתוח את ה- Outlook עם הרשאות רגילות. מכיוון שלרוב המשתמשים אין הרשאות אדמיניסטרטיביות יצטרך מנהל הרשת לעבור מחשב מחשב ולבצע את השינוי.

Read more: Agile IT Blog
QR: how-to-disable-always-ask-before-opening-dialog-box.aspx

Posted via email from Jasper-net

Run a ASP.Net site/service? Update now... (Vulnerability in ASP.NET Could Allow Denial of Service and Vulnerabilities in .NET Framework Could Allow Elevation of Privilege)

|
A few minutes ago Microsoft released an advance notification security bulletin announcing that we are releasing an out-of-band security update to address an ASP.NET Security Vulnerability.

The security update we are releasing resolves a publicly disclosed Denial of Service issue present in all versions of ASP.NET. We’re currently unaware of any attacks on ASP.NET customers using this exploit, but we strongly encourage customers to deploy the update as soon as possible.

We are releasing the security update via Windows Update and the Windows Server Update Service. You can also manually download and install it via the Microsoft Download Center. We will release the update on Thursday, December 29th at approximately 10am Pacific Time (US and Canada). We are announcing it ahead of time to ensure that administrators know that the security update is coming, and are prepared to apply it once it is available.


Read more: Greg's Cool [Insert Clever Name] of the Day
Read more: ASP.NET Security Update Shipping Thursday, Dec 29th
QR: asp-net-security-update-shipping-thursday-dec-29th.aspx

Posted via email from Jasper-net

HowTo: Build a VNC Client for the Browser

|
VNC is just a special case of client-server, though perhaps an especially cool one.

Quite a few rising web technologies do robust client-server work extra well (Node.js, WebSockets, etc.) -- and in-browser VNC is nothing new.

Here are two (open-source, of course):

    noVNC is more ambitiously HTML5-duplexed, using WebSockets as well as Canvas. It's quite popular, and has its own 10-page Github wiki. Also supports wss:// encryption. Use this if you want a reliable, battle-tested HTML5 client. (WebSocket fallback is provided by web-socket-js.)
    vnc.js was written in 24 hours, during LinkedIn's first public Intern Hackday. So of course it hasn't been tested thoroughly, and probably could be written a little more cleanly. But there's something beautifully coherent about an app written in a single session. If the app really does work, then some of the decisions will make a little more sense -- it's possible to get into the developer's mind a little more easily -- and breaking down the code doesn't result in as many 'why did they do this??' moments, because the developers' minds were never far from any part of the project, at any moment during development.


vnc.js doesn't use WebSockets (it uses Socket.io instead), but that's fine -- a little less HTML5, a little more slick JavaScript doesn't hurt anyone.

Plus the marathoning hackers behind vnc.js put together a sweet little tutorial detailing the decisions made that 24-hour period, emphasizing the rapid thought-process behind the architecture (in clear diagrams), and a very practical abstraction for easier in-browser work with TCP (using Node.js and Socket.io) and RFB.


Read more: HTML5 Zone
QR: howto-build-vnc-client-browser

Posted via email from Jasper-net

Могу ли я увидеть код?

|
Некоторое время назад Карен Сэндлер (исполнительный директор в GNOME Foundation) был поставлен диагноз Гипертрофическая кардиомиопатия, что, если не вдаваться в медицинские подробности, существенно увеличивает вероятность смерти от проблем с сердцем. Ей была рекомендована установка кардиостимулятора. Испытывая законное любопытство, Карен спросила, что за программное обеспечение работает в нём и может ли она взглянуть на его код, перед тем, как доверить ему свою жизнь. После множества пожиманий плечами, смущенных взглядов и переводов стрелок, кот, наконец-то, был вынут из мешка.

Оказалось, что все медицинские устройства (в США?) сертифицируются организацией FDA (Food and Drug Administration), которая никогда не проводит ревью исходного кода, пока с устройством не случится некоторая проблема, которая явно связана с ПО. Вместо этого, FDA полагается на отчет производителя, в котором, конечно же, может быть написано всё, что угодно. Кроме общих стандартов по форматированию текста, никаких особых требований к этому документу нет.

Объясняется всё это следующим образом: каждое медицинское устройство уникально, FDA просто не в состоянии выработать какие-то общие требования ко всем устройствам, не упустив что-то важное, а создавать такие правила для каждого отдельного аппарата — слишком долго и дорого. Также, FDA, конечно же, не знакомо с аппаратным устройством создаваемой техники на уровне её производителя, а значит именно он (и только он) может решать, как именно должен быть построен софт, какие тесты он должен пройти и когда быть признан годным к уставновке в реальные устройства.


Read more: Habrahabr.ru
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://habrahabr.ru/blogs/open_source/135554/

Posted via email from Jasper-net

My Kernel Debugger Won't Connect

|
2870.image001_5F00_thumb_5F00_06064C73.png

Hello ntdebugging readers, the Debug Ninja is back again with a quick blog this holiday season.  I recently encountered a situation where the kernel debugger could not connect to a Windows Server 2008 R2 system running in a Hyper-V virtual machine.  The configuration appeared correct; however, the debugger would not connect to the VM.

In windbg you can use Ctrl+Alt+D to view the debugger’s internal information flow.  In KD use Ctrl+D followed by ENTER to toggle the output.  Enabling this output I could see that the debugger was unable to read from the debug port, and that it was getting timeouts.  The error "SYNCTARGET: Timeout." is a clear indication that the debug host cannot communicate with the debug target, especially when this error appears after a “Send Break in” message.

Read more: Ntdebugging Blog
QR: my-kernel-debugger-won-t-connect.aspx

Posted via email from Jasper-net

Top 11 Unit Testing Articles in 2011

|
Typemock’s done a lot in 2011 and we have a lot more to do in 2012 to bring you the best unit testing tools for .NET and C++. We have big plans to redefine unit testing to reduce defects in your code, early in the process, and let you deliver high quality innovation.

In the meantime, though, check out these Top 11 articles for 2011.

2012

11. How do you start Unit Testing? Discover the essential steps to begin unit testing!

10. Are you in the Unit Testing Death Spiral of Doom?

9. Use MSTest? Discover how to check exception messages.

8. Are your tests effective? Here are 3 signs that your tests aren’t doing their job.

7. What does Uncle Bob have to say? Listen to Typemock’s interview with him!

6. Life imitates Dilbert. Does your Agile team look like it’s straight out of Dilbert?

5. Developer testing is highly recommended but it’s not just unit testing. Sometimes one type of test is appropriate and sometimes another. What’s the difference between unit testing and integration testing?

4. SharePoint Dev? Join the community. Here are 10 Resources for SharePoint Developers.

3. Agile turned 10. And, like any pre-teen, it has its growing pains. Agile Development is Broken. How can we fix it?

Read more: Typemock
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=www.typemock.com/blog/2011/12/29/top-11-unit-testing-articles-in-2011/

Posted via email from Jasper-net

Configuring a Hyper-V VM For Kernel Debugging

|
8547.Settings2_5F00_thumb_5F00_6967B1F9.png

   Yesterday's blog prompted some questions about how to set up a debugger for a Windows OS running in a Hyper-V VM.  I was surprised that I wasn't able to find good, publicly available, Microsoft issued documentation for this configuration.

The first step is to configure the Windows OS in the VM to enable a kernel debugger on COM1.  One would use these same steps if you were preparing the OS to be debugged using a null modem cable.  Hyper-V will allow us to redirect the COM port so that we don't need such a cable.

    Start an administrative command prompt.
    Turn on debugging with this command:

    bcdedit /debug on

    Configure the debugger to use COM1 with this command:

    bcdedit /dbgsettings SERIAL DEBUGPORT:1 BAUDRATE:115200


        Note that these are the default settings and already exist in most bcd stores.  However setting them again won't damage anything, and guards against a situation where the dbgsettings have been previously modified.

    Reboot so that the boot loader can read the new settings and configure the OS for debugging.


Read more: Ntdebugging Blog
QR: configuring-a-hyper-v-vm-for-kernel-debugging.aspx

Posted via email from Jasper-net

WiFi Bridge

|
dbzH4.png

With WiFi bridge you can easily connect a wired or WiFi connected PC to another WiFi enabled device ( e.g. BlackBerry, Zune, Windows Phone, iPhone...)

Read more: Codeplex
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://wifibridge.codeplex.com/

Posted via email from Jasper-net

Installing a User Account Service Unattended (Part 1)

|
serviceaccount.png

    In many productions environments, Windows Services required to run under a privileged domain account. NET services consume the Installer Class foundation to control its installation flow. In most cases, your .NET service ends up packaged in MSI installer which automates the actions InstallUtil does in command line.

But what if you want to install a user account service automatically without bothering the user (other than the service account user\password entries) with post installation actions? Commonly MSI authors will use the ServiceInstall Table which allows runtime entry of username (‘StartName’ column) and password among other properties. However, in case the target service is always expected to run under a domain account, since Installutil.exe (Installer Tool) 4.0 there is another solution.
Service Setup

    First, the service must be set with user account. Fortunately this is the default behavior of ServiceProcessInstaller.

    this.serviceProcessInstaller = new System.ServiceProcess.ServiceProcessInstaller();
    this.serviceProcessInstaller.Account = new System.ServiceProcess.ServiceAccount.User;
    this.serviceProcessInstaller.Password = null;
    this.serviceProcessInstaller.Username = null;


Read more: KMoraz's Sandbox
QR: installing-a-user-account-service-part-1.aspx

Posted via email from Jasper-net

Windows 8 Vs Ubuntu Let’s get a closer view.

|
windows-vs-ubuntu.png

When Microsoft announced Windows 8 and released the developer version, it created a lot of buzz around the Internet. With all the new Metro UI and Cloud integration, Windows 8 has certainly taken a huge step in the world of computing. However, the buzz that Windows 8 created was all diverted towards Ubuntu 11.10, when the folks at Canonical released it few days back.

Microsoft’s Windows has managed to lead the competition in the Desktop OS market with 91.9 percent market share, while the Mac OS has a 6.9 percent market share. However, now the popularity of Ubuntu is rising, and Microsoft has a new level of competition in the OS market. Ubuntu is the next big challenge for Microsoft and it might prove Microsoft wrong, which once thought that Linux was over and done with.

When I had my first glimpse at the Microsoft Windows 8 developer version, I was totally impressed with its looks and features. However, I was more captivated and fascinated towards Ubuntu 11.10, and just like a small kid, I was excited about it. And certainly, Ubuntu kept up to my expectations by bringing in vast improvements and many awaited features.

Read more: SparkyHub
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.sparkyhub.com/windows-8-vs-ubuntu-lets-get-a-closer-view/

Posted via email from Jasper-net

התקנת Windows 8 על VirtualBox

|
Create-new-virtual-machine-name_thumb.png

מדריך זה מסביר צעד אחר צעד איך מתקינים Windows 8 בסביבה של VirtualBox.
בשלב ראשון יש ליצור מחשב וירטואלי עבור Windows 8.

Read more: Eli Shlomo Blogs
QR: windows-8-virtualbox.aspx

Posted via email from Jasper-net

Booting an Intel Architecture System, Part I: Early Initialization

|
Intel1.gif

The boot sequence today is far more complex than it was even a decade ago. Here's a detailed, low-level, step-by-step walkthrough of the boot up.

Taking a lot of little steps along a path is a good analogy for understanding boot flow in Intel Architecture-based systems. The minimum firmware requirements for making a system operational and for booting an operating system are presented in this article. The vast majority of systems perform these steps in this article to do a full or cold boot. Depending on the architecture of the BIOS, there may be multiple software phases to jump through with different sets of rules, but the sequence for waking up the hardware is, at least in the early phases, very much the same.

Hardware Power Sequences: The Pre-Pre-Boot

When someone pushes the power button, the CPU can't simply jump up and start fetching code from flash memory. When external power is first applied, the hardware platform must carry out a number of tasks before the processor can be brought out of its reset state.

The first task is for the power supply to be allowed to settle down to its nominal state. Once the primary power supply settles, there are usually a number of derived voltage levels needed on the platform. For example, on the Intel Architecture reference platform the main input supply is a 12-volt source, but the platform and processor require voltage rails of 1.5, 3.3, 5, and 12 volts. Voltages must be provided in a particular order, a process known as power sequencing. The power is sequenced by controlling analog switches, typically field-effect transistors. The sequence is often driven by a Complex Program Logic Device (CPLD).

Platform clocks are derived from a small number of input clock and oscillator sources. The devices use phase-locked loop circuitry to generate the derived clocks used for the platform. These clocks take time to converge.

Read more: Dr. Dobb's
QR: 232300699

Posted via email from Jasper-net

Windows 8 8102 New Group Policy

|
כחלק מהעבודה שלי עם Windows 8, כן היה לי אומץ לי להתקין אותו על הנייד הראשי שלי ולעבוד איתו ביומיום. בעבודה השוטפת עליתי על לא מעט חידושים ושינויים, אחד הדברים שעניינו אותי הם האובייקטים החדשים ב-Group Policy. מצורפת רשימה של כל ה-ADMX  החדשים (וכאלה שחודשו).

ישנם פוליסי חדשים כגון: 3G/4G policies, Windows App Store Configuration.


ADMX

Description

AppXPackageManager.admx AppX deployment. AppX is the new Windows 8 package format that will be used by the Windows 8 app store.
dam.admx Desktop Activity Monitor
DeviceCompat.admx Device and Driver Compatibility
DeviceSetup.admx Policy settings that control the deployment of device software
EAIME.admx Input Method Configuration
EarlyLaunchAM.admx Early Launch Anti-Malware settings
EdgeUI.admx Contains settings related to system user interfaces attached to the screen edges.
ExternalBoot.admx Contains Portable Workspace policy settings. (Windows to Go)
kdc.admx Configuration settings for the Kerberos Key Distribution Center
LocationProviderAdm.admx Windows Location Provider Service configuration
msched.admx Maintenance Scheduler Policies
nca.admx Network Connectivity Assistant policies
NetworkIsolation.admx Configures Network Isolation Options
ProximityCommon.admx Proximity experiences policies
Servicing.admx Windows Servicing Policies – i.e. automated repair
SettingSync.admx Synchronization of settings

(more....)


Read more: Eli Shlomo Blogs
QR: windows-8-8102-new-group-policy.aspx

Posted via email from Jasper-net

PerfView

|
Overview

PerfView is a performance analysis tool focusing on ETW information (ETL files) as well as CLR memory information (heap dumps). It can collect and view ETL files as well as XPERF CSV files. Powerful grouping operators allow you to understand performance profiles in ways other tools can't. PerfView is used internally at Microsoft by a number of teams and is the primary performance investigation tool on the .NET Runtime team. Features include:

        Non-invasive collection - suitable for use in live, production environments
        Xcopy deployment - copy and run
        Memory
            Support for very large heaps (gigabytes)
            Snapshot diffing
            Dump files (.dmp)
        CPU Performance
            Support for managed, native, and mixed code
            Can read XPerf logs
            Profile diffing”


Read more: Yuval Sinay
QR: perfview.aspx

Posted via email from Jasper-net