ASP.NET Developer Guidance Map

Total Page:16

File Type:pdf, Size:1020Kb

ASP.NET Developer Guidance Map ASP.NET Developer Guidance Map J.D. Meier, Principal PM, Microsoft http://blogs.msdn.com/jmeier Contents at a Glance • Introduction • Sources of ASP.NET Developer Guidance • Topics and Features Map (a “Lens” for Finding ASP.NET Content) • Summary Table of Topics • How The Map is Organized (Organizing the “Content Collections”) • Getting Started • Architecture and Design • Code Samples • How Tos • Videos • Training Introduction Welcome to the Microsoft ASP.NET Developer Guidance Map! This map is a consolidated index of ASP.NET content collections for developers. The primary content collections included in this map are: Code Samples, How Tos, Videos, and Training. Within the content collections, the resources are organized by ASP.NET features, common tasks, and common categories for ASP.NET. Usage Scenarios • Use the map to discover the various sources of developer content at Microsoft • Use the map to find some of the most useful content for helping you solve your problems with ASP.NET • Use the map as an example to help you create your own map of content resources Mental Model ASP.NET Developer Guidance Map (Mental Model) Sources Lens Content Collections Code How Tos Videos Training q Documentation Samples q Dev Centers Topics q MDSN Library q Channel9 Tasks q Code Gallery q Forums Features q … etc. Types Sources of ASP.NET Developer Guidance You can think of this as a “topology map” of some of the main sources of ASP.NET developer guidance from Microsoft. Simply by knowing what types of resources are available (code, forums, documentation, training, etc.), and by knowing where to look, you improve your success at finding the resources you need to get your job done, whether that’s figuring out how to code for a particular scenario, ramping up on the technology, or finding the latest news. Here is a summary of the various channels and some of what they have to offer: Category Items Documentation • ASP.NET 4 - http://msdn.microsoft.com/en-us/library/ee532866.aspx • API Reference - http://msdn.microsoft.com/en-us/library/4w3ex9c2.aspx • Code Sample Downloads - http://msdn.microsoft.com/en- us/library/ee332498.aspx • Walkthroughs by Scenario - http://msdn.microsoft.com/en- us/library/bb515247.aspx Developer • ASP.NET Dev Center – http://www.asp.net Centers • ASP.NET MVC Dev Center– http://www.asp.net/mvc MSDN Library • MSDN Library ASP.NET - http://msdn.microsoft.com/en- us/library/dd566231.aspx Channel 9 • Channel 9 – ASP.NET: http://channel9.msdn.com/tags/ASP.NET/ Code Gallery • ASP.NET Code Samples - http://code.msdn.microsoft.com/Project/ProjectDirectory.aspx?TagName=ASP. NET Forums • ASP.NET Forums - http://forums.asp.net/ • MSDN Forums (root) - http://social.msdn.microsoft.com/Forums/en- us/categories/ Sample Apps • ASP.NET Web Forms - http://www.asp.net/web-forms • ASP.NET MVC - http://www.asp.net/mvc Starter Kits and • ASP.NET Starter Kits and Samples - Samples http://www.asp.net/community/projects#jm_starter_kits_and_samples Training • Beginner Developer Learning Center - http://msdn.microsoft.com/en- us/beginner/bb308760.aspx Ramp Up • Web Development with ASP.NET - http://msdn.microsoft.com/en- us/rampup/dd861531.aspx • Learn ASP.NET: for PHP Developers - http://msdn.microsoft.com/en- us/rampup/dd861537.aspx Videos • Video Tutorials - http://www.asp.net/get-started Support • ASP.NET Solution Center - http://support.microsoft.com/ph/6245 General • MSDN Magazine - http://msdn.microsoft.com/magazine/ Blogs • ASP.NET QA Team - http://weblogs.asp.net/asptest/default.aspx • Bertrand Le Roy - http://weblogs.asp.net/bleroy/default.aspx • Carl Dacosta - http://weblogs.asp.net/carldacosta/default.aspx • Dave Reed - http://weblogs.asp.net/infinitiesloop/default.aspx • Eilon Lipton - http://weblogs.asp.net/leftslipper/default.aspx • IE Team - http://blogs.msdn.com/ie • Joe Stagner - http://msjoe.com/blog/ • Scott Guthrie – http://weblogs.asp.net/scottgu • Scott Hanselman - http://www.hanselman.com/blog/ • Silverlight Team - http://team.silverlight.net/ • Web Platform Team - http://blogs.iis.net/msdeploy/ • Web Tools Team - http://blogs.msdn.com/webdevtools/ Topics and Features Map (a “Lens” for Finding ASP.NET Content) One of the simplest ways to find content for a product or technology is to actually know what the most common topics or categories are, the main features, and the APIs or families of APIs. When you know the label for a topic, feature or API, it makes it easier to search or browse for the information. Here is a map of common topics, features, and APIs for ASP.NET: Topics • Authentication • Page Rendering • Authorization • Presentation Entity • Caching • Request Processing • Exception Management • Service Interface • Logging and Instrumentation • Session Management • Navigation • Validation • Page Layout (UI) Features • ASP.NET MVC • Master Pages • Dynamic Data • MVC View Engines • Controls • Routing • Entity Framework • Security • jQuery • Web client standards (HTML5, CSS2, Ajax, JSON, etc) More Features... • Accessibility conforming HTML output • Forms Authentication Provider • ASP.NET AJAX • Framework Targeting • ASP.NET Dynamic Data • Health/Performance Monitoring • ASP.NET Model View Controller (MVC) • Language-Integrated Query (LINQ) Support • ASP.NET Web Parts (Real time user-modifiable • Master Pages content) • Membership and Roles User Management Security • Caching/Extensible Output Caching • Merge and Manage assemblies (ASP.NET Merge Tool) • Code Access Security • Microsoft Management Console (MMC) • Control Templates, Themes and Skins • Mobile Device Support • Browser Capability Providers • Page and Controls Framework • Browser Definitions Customization (ASP.NET • Precompiled Web Applications (ASP.NET Compilation Tool) Browser Registration Tool) • Preloading for Web Applications • Customizable HTTP handlers and HTTP modules • Process Identity & Impersonation • Data Access Controls • Protected Configuration (configuration encryption) • Data Validation Controls • Regular Expression API • Data Visualization Charting • Routing • Deployment & Packaging Tools • Session State API • Designer & Controls Extensibility • Session State Compression • Extensible Configuration Scheme & Configuration • Standard Toolbox Controls API • State Management (distributed state facilities) • Extensible Hosting/Web Application Life-Cycle • XML Web Services Support API Management API’s • ApplicationServices • RegularExpressions • Runtime.Caching • Routing • ClientServices • Script • Configuration • Security • DynamicData • Services • Handlers • SessionState • Management • UI • Profile • Util • Query • Web Summary Table of Topics Here is a brief explanation of some of the topics and features used to organize the content collections: Category Description Ajax / JQuery Ajax and jQuery are technologies that enable the development of rich client-side browser experiences by enabling synchronous/asynchronous communication to the server for remote procedure call. jQuery provides further HTML document management and event handling features as well. Authentication Designing an effective authentication strategy is important for the security and reliability of your application. Improper or weak authorization can leave your application vulnerable to spoofing attacks, dictionary attacks, session hijacking, and other types of attack. Authorization Authorization determines the tasks that an authenticated identity can perform, and identifies the resources that can be accessed. Designing an effective authorization strategy is important for the security and reliability of your application. Improper or weak authorization leads to information disclosure, data tampering, and elevation of privileges. Defense in depth is the key security principle to apply to your application’s authorization strategy. Caching Caching is a way to temporarily store information so that you can optimize response time, avoid unnecessary requests, and reduce processing load on the server. Cloud / Windows Windows Azure is a cloud-computing platform. Azure Controls ASP.NET leverages controls of a variety of forms to build user interfaces. This topic encompasses; User Controls, Server Controls, Custom Server Controls and Web Parts. CSS CSS 2.0 is the evolved form of Cascading Style Sheets. With more refined semantics, CSS 2.0 enables much richer control of HTML based user interfaces. Data Access Data access from ASP.NET encompasses any means of establishing a connection to a source of data. Evolved standards include Linq to SQL and WCF Data Services. Older technologies might include ODBC or OLEDB. Data Controls Data Controls are a class of ASP.NET controls that support data binding. The DataGrid control is an example of such a control. Entity Framework The ADO.NET Entity Framework is an ORM (object-relational mapping) framework for the .NET Framework that enables applications to deal with data through conceptual schemas instead of hard-coding database structure into the application. Exception Designing an effective exception management strategy is important for the Management security and reliability of your application. Correct exception handling in your Web pages prevents sensitive exception details from being revealed to the user, improves application robustness, and helps to avoid leaving your application in an inconsistent state in the event of an error. HTML 5 HTML 5 is the evolved ISO standard for HTML commonly referred to in the context of “Web 2.0” style applications. HTML 5 enables richer control of the HTML Document Object Model which provides for more robust user
Recommended publications
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Windows 7 – Hands-On Training Table of Contents PINNING PROGRAMS and USING JUMP LISTS
    Windows 7 – Hands-on Training Table of Contents PINNING PROGRAMS AND USING JUMP LISTS ..................................................................................... 3 THE START MENU .............................................................................................................................................. 3 Pin a program icon to the Start menu ............................................................................................................. 3 View the Jump List for a program .................................................................................................................. 4 Open an item from the Jump List ................................................................................................................... 4 Pin an item to a Jump List .............................................................................................................................. 4 Unpin an item ................................................................................................................................................. 4 THE TASKBAR .................................................................................................................................................... 5 Pin a program icon to the taskbar ................................................................................................................... 5 View the Jump List for a program .................................................................................................................
    [Show full text]
  • Scott Guthrie Keynote Speaker at NDC 2011 See Agenda at P.42-43
    For software developers and leaders NDC motivates Unit 4, Agresso see why at p.28 Scott Guthrie Keynote Speaker at NDC 2011 see Agenda at p.42-43 The Big Wall: Who needs How to Bring a Huge a service bus, Product Backlog anyway? Down to Size by Udi Dahan by Mitch Lacey ALSO FEATURING: IAN ROBINSON ANDERS NORÅS ROD PADDOCK GASPAR NAGY JONAS BANDI JEFF WILCOX GREG SHACKLES DOMINICK BAIER JON SKEET GILL CLEEREN GARY SHORT BILLY HOLLIS MARK SEEMANN SCOTT bellware NORWEGIAN DEVELOPERS CONFERENCE 2011 Oslo Spektrum, Oslo June 8 -10th Navn: Hege Lidenskap: Spreke løsningskonsepter Jobb: Senior Business Consultant Navn: Terje Lidenskap: SharePoint Jobb: Senior Software Engineer FOTO: BO MATHISEN Bli en del av vårt sterke fagmiljø innen samhandling og SharePoint Steria er blitt kåret til en av Norges beste arbeidsplasser fire år på rad. Det er ikke uten grunn. Mye skyldes de gode utviklingsmulighetene. Mye skyldes de utfordrende prosjektene. Mye skyldes det sterke og gode fagmiljøet. Velkommen til et av Europas største Vårt fagmiljø innen samhandling og informasjons- Spennende utfordringer it-konsulentselskaper håndtering er trolig et av Nord-Europas sterkeste. Vi er Steria er en kunnskapsbedrift. Vi lever av å gi gode Det har skjedd mye siden vi etablerte oss i 1969 i EMC Documentum partner og den eneste leverandøren råd om ledelse og it. Basert på våre sterke fagmiljøer Paris. Vi er nå et av Europas 10 største it-konsulent- som har godkjent Noark 5 kjerne for Documentum med bistår vi en rekke av Norges største virksomheter innen selskaper med 20 000 medarbeidere i 16 land og sakarkiv.
    [Show full text]
  • 1 Research Article Exploring Attitudes of ASP.NET Web Developers
    Research Article Exploring Attitudes of ASP.NET Web Developers toward New Technologies: Silverlight, MVC 3, HTML 5, Internet Explorer 9 Takeshi K. Eto, Ph.D., Stefanus Hadi, Ph.D. DiscountASP.NET Published: January 4, 2011 Summary The challenge for all technology innovators is to ensure their technologies stay relevant for users who consume the technology, remain important to the developers who develop with the technology and adapt to competitive forces in a constantly changing technology landscape. One important aspect of business intelligence is to track the opinions and attitudes of developers. Based on the results of a September 2010 survey of DiscountASP.NET customers, general attitudes of ASP.NET web developers toward new technologies are explored, including MVC 3, Silverlight, HTML 5 and Internet Explorer 9. The survey results are viewed using different comparisons and segmentation techniques to observe underlying trends. Introduction All technologies go through a lifecycle in the marketplace. Technology adoption is dynamic and is influenced by changing consumer interests and behavior, developer’s interest in using the particular technology, and many other competitive factors. To keep the technology relevant in the marketplace, the technology innovator must understand the changing consumer behavior trends, sustain the passion of their core developers, and adapt to the changing technology landscape. Therefore, one important aspect of business strategy is to track the opinions and attitudes of developers. To illustrate the interplay
    [Show full text]
  • Introducing Silverlight From?
    02_0672330148_ch01.qxd 9/25/08 2:23 PM Page 3 Silverlight 2 Unleashed, published by SAMS, Copyright 2009 Pearson Education, Inc. ISBN 0672330148 CHAPTER 1 IN THIS CHAPTER . Where Does Silverlight Come Introducing Silverlight From? . Using Third-Party Plug-Ins . Running on Multiple Platforms . Making the Web Application Secure t all started when Microsoft presented its revolutionary I . Introducing Silverlight.net user interface (UI) framework, Windows Presentation Foundation, to an enthusiastic crowd of graphics designers, . What Do You Need to Run software developers, and businessmen in March 2006 at the Silverlight? new MIX conference in Las Vegas. Microsoft also added . Updating Your Runtime— one session about a lesser-known technology with the Automatically rather barbarian name Windows Presentation Foundation . Trying Silverlight Demos Everywhere, or WPF/E. There was nothing much to see yet, but the abstract was enticing: “With WPF/E you’ll be able . What Do You Need to Develop to build rich, interactive experiences that run in major Web Silverlight? browsers on major platforms as well as on mobile devices.” . Reading the Documentation A little more than a year later, at the second edition of the . Looking into Silverlight’s same MIX conference, Scott Guthrie (general manager at Future Microsoft, responsible for most of the .NET teams) climbed on stage and gave the crowd an amazing software demon- stration. The barbarian WPF/E was gone; in its place was Silverlight (see Figure 1.1). A bright new logo revolved on the screens. Gradients and animations were all over the place. Planes flew over the web browser’s window, connecting US cities while Scott was planning his next trips; a chess application let the browser’s JavaScript engine play against .NET, demonstrat- ing without any doubt the superior power of the compiled .NET application over JavaScript’s interpreted code.
    [Show full text]
  • Cloud Computing Bible Is a Wide-Ranging and Complete Reference
    A thorough, down-to-earth look Barrie Sosinsky Cloud Computing Barrie Sosinsky is a veteran computer book writer at cloud computing specializing in network systems, databases, design, development, The chance to lower IT costs makes cloud computing a and testing. Among his 35 technical books have been Wiley’s Networking hot topic, and it’s getting hotter all the time. If you want Bible and many others on operating a terra firma take on everything you should know about systems, Web topics, storage, and the cloud, this book is it. Starting with a clear definition of application software. He has written nearly 500 articles for computer what cloud computing is, why it is, and its pros and cons, magazines and Web sites. Cloud Cloud Computing Bible is a wide-ranging and complete reference. You’ll get thoroughly up to speed on cloud platforms, infrastructure, services and applications, security, and much more. Computing • Learn what cloud computing is and what it is not • Assess the value of cloud computing, including licensing models, ROI, and more • Understand abstraction, partitioning, virtualization, capacity planning, and various programming solutions • See how to use Google®, Amazon®, and Microsoft® Web services effectively ® ™ • Explore cloud communication methods — IM, Twitter , Google Buzz , Explore the cloud with Facebook®, and others • Discover how cloud services are changing mobile phones — and vice versa this complete guide Understand all platforms and technologies www.wiley.com/compbooks Shelving Category: Use Google, Amazon, or
    [Show full text]
  • Ignite 2016 Atlanta, USA Leif Lagebrand 2016-10-05 Cloud First, Mobile First
    Konferens: Ignite 2016 Atlanta, USA Leif Lagebrand 2016-10-05 Cloud first, mobile first • Inga stora nyheter, det mesta känt sedan tidigare. Man kan se konferensen som en sammanfattning av det senaste årets händelser • Officiellt: Windows Server 2016 och System Center 2016. Mer senare om det • Microsofts molndel, Azure, växer med mer än 100% per år och de kan inte se någon avmattning Information från Ignite 2016 • Konferensens hemsida https://myignite.microsoft.com • Alla videor https://myignite.microsoft.com/videos • Eller här https://techcommunity.microsoft.com/t5/Microsoft-Ignite-Content/bd-p/MicrosoftIgniteContent • Youtube, https://www.youtube.com/channel/UCrhJmfAGQ5K81XQ8_od1iTg • Kanske kommer några på Channel 9 https://channel9.msdn.com/ Finns ditt arbete kvar i framtiden? • Foxconn ersätter 60 000 arbetare med robotar http://www.bbc.com/news/technology-36376966 • Om 20 år har 50% av alla nutida jobb försvunnit http://stratresearch.se/wp-content/uploads/varannat-jobb- automatiseras.pdf • Uber behöver ingen taxicentral/växel Keynote – Satay Nadella, VD Microsoft https://youtu.be/fLdJKcMLCbs • Artificiell Intelligens, Machine Learning, Cortana • Delve Analytics i O365- analyserar vad jag gör under en dag vilka jag epostar eller skypar med och jag får en sammanställning på det • Dynamics CRM 365 – letar på Internet och t ex Linkedin efter händelser kring dina kunder http://crmroadmap.dynamics.com/ • Cortana Intelligence Suite https://www.microsoft.com/sv-se/server-cloud/cortana- intelligence-suite/overview.aspx • Microsoft Graph, Web Graph, Bots (röstrobotar t ex) https://support.microsoft.com/sv-se • Allt finns ett API bort, hos Microsoft i Azure. • Uber låter sina förare titta i mobilkameran för att identifiera dem när de ska köra, har de glasöon på ser Cortana Cognitive Services det och ber dem ta av dem.
    [Show full text]
  • SILK Using the Remote Desktop Scheduler Logging Into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide
    SILK Using the Remote Desktop Scheduler Logging into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide Overview As of October 21, 2015, there are two methods of logging into the SILK Scheduler: LBLESD Citrix Login Interface or the new LBL Remote Desktop User Logon Interface. Citrix Login Interface is used to provide a secured entry into SILK applications. Citrix requires a license for each person logging into using SILK. The Remote Desktop Login Interface (for SILK - RD SILK Scheduler) is another type of secure login method for accessing SILK. LBL has purchased a single license for this product that allows an unlimited number of client users. LBL Information Systems and LBL Network are promoting the use of the Remote Desktop Login Interface for SILK because of: • Security control • Quicker logon response • No idle time limits • No limit to the number of users logged into SILK • Uses the same security – Domain, User ID and Password • SILK works as it always has • And works with web browsers: IE (10 and up), Mozilla Firefox, and Google Chrome Logging into SILK using RD SILK Scheduler To log into SILK using the RD SILK Scheduler you will need to know the Domain, your User ID, and password. For most SILK users the domain is SIS. The user id and password is the same that you currently use for SILK. During your first time using this URL address, you may encounter several Firefox browser security windows before you are allowed to log into your SILK district. Using Mozillia Firefox, enter the following URL to access the RD SILK Scheduler: https://scheduler.lblesd.k12.or.us Linn Benton Lincoln ESD Help Desk: 541.812.2800 or 866.914.2800 firefox browser-remote desktop silk scheduler.docx www.lblesd.k12.or.us https://swhelpdesk.lblesd.k12.or.us version date: 2015.12.04 SILK Using the Remote Desktop Scheduler Logging into SILK Using Mozilla Firefox Browser - SILK Quick Reference Guide Once the User Login page is displayed, enter your SILK security information.
    [Show full text]
  • ARCHIVE 2711.Pdf
    ComputorEdge 3/13/09 ComputorEdge™ Online — 03/13/09 This issue: Flash Drives: Computing in Your Pocket The little memory chips have become more than just a way to save and move files. Now you can carry all your computing with you to work with any computer. Table of Contents: Digital Dave by Digital Dave Digital Dave answers your tech questions. A reader wants to run antivirus software from a flash drive; a reader's new external SATA drive isn't much faster than his old ATA drive; why would a reader's computer be shutting down at random intervals? Flash Drive Security by Michael J. Ross They're handy, portable and easy to lose. The diminutive size and light weight of flash drives makes them ideal for portable data storage, but it also makes them easily lost or stolen. Flash drive manufacturers and security software developers are creating a variety of solutions. Linux on a Flash Drive by Michael J. Ross Shrinking OS meets growing-capacity drives. (Click Banner) Linux is an operating system shrinking in size, while USB flash drives are growing in capacity. It was inevitable that a point would be reached at which Linux could be running on a simple flash drive. Windows Vista Tips and Tricks by Jack Dunning Save Time by Using Favorite Links in Windows Explorer Many people ignore the existence of the Favorite Links feature. However, if you take the time to play with it, you will most likely fall in love with this extra feature of Windows Vista. Wally Wang's Apple Farm by Wally Wang New Macintosh Models After a seeming eternity of waiting, Apple released updates to the Mac Pro, (Click Banner) iMac and Mac mini.
    [Show full text]
  • Technical Blueprint for Vertical Use Cases and Validation Framework
    Deliverable 1.1 Technical Blueprint for Vertical Use Cases and Validation Framework Version 1.0 Partners This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 957242 Abstract This document describes the five use cases that are the targets for 5G Non-Public Network (NPN) developments within the FUDGE-5G project. The use cases addressed are: (i) Concurrent Media Delivery, (ii) Public Protection and Public Relief (PPDR), (iii) 5G Virtual Office, (iv) Industry 4.0, (v) Interconnected NPNs. List of Authors and Reviewers 1.1. Authors Author Partner Carlos Barjau, Josep Ribes, Borja Iñesta, David Gomez-Barquero UPV Kashif Mahmood (Editor), Pål Grønsund, Ole Grøndalen, Andres Gonzalez TNOR Daniele Munaretto, Marco Centenaro, Nicola di Pietro ATH Jose Costa, Mika Skarp CMC Pousali Charkaborty, Marius Corici FHG Peter Sanders O2M Thanos Xirofotos UBI Luis Cordeiro, André Gomes, António Borges ONE Manuel Fuentes, Andrés Meseguer, Teresa Pardo, David Martín-Sacristán 5CMM Sebastian Robitzsch, Kay Hänsge IDE Zoran Despotovic, Artur Hecker, Dirk Trossen HWDU Filippo Rebecchi THA D1.1 Technical Blueprint for Vertical Use Cases and Validation Framework Page 2 of 85 1.2. Reviewers Reviewer Partner Erik Vold NRK Waqas Ikram ABB Kennet Nomeland Norwegian Defense Materiel Agency (NDMA) Karl Øyri Oslo University Hospital (OUS) Steve Appleby British Telecom (BT) Disclaimer This FUDGE-5G D1.1 deliverable is not yet approved nor rejected, neither financially nor content-wise by the European Commission. The approval/rejection decision of work and resources will take place at the Mid-Term Review Meeting planned in November 2021, after the monitoring process involving experts has come to an end.
    [Show full text]
  • Security Analysis of Browser Extension Concepts
    Saarland University Faculty of Natural Sciences and Technology I Department of Computer Science Bachelor's thesis Security Analysis of Browser Extension Concepts A comparison of Internet Explorer 9, Safari 5, Firefox 8, and Chrome 14 submitted by Karsten Knuth submitted January 14, 2012 Supervisor Prof. Dr. Michael Backes Advisors Raphael Reischuk Sebastian Gerling Reviewers Prof. Dr. Michael Backes Dr. Matteo Maffei Statement in Lieu of an Oath I hereby confirm that I have written this thesis on my own and that I have not used any other media or materials than the ones referred to in this thesis. Saarbr¨ucken, January 14, 2012 Karsten Knuth Declaration of Consent I agree to make both versions of my thesis (with a passing grade) accessible to the public by having them added to the library of the Computer Science Department. Saarbr¨ucken, January 14, 2012 Karsten Knuth Acknowledgments First of all, I thank Professor Dr. Michael Backes for giving me the chance to write my bachelor's thesis at the Information Security & Cryptography chair. During the making of this thesis I have gotten a deeper look in a topic which I hope to be given the chance to follow up in my upcoming academic career. Furthermore, I thank my advisors Raphael Reischuk, Sebastian Gerling, and Philipp von Styp-Rekowsky for supporting me with words and deeds during the making of this thesis. In particular, I thank the first two for bearing with me since the release of my topic. My thanks also go to Lara Schneider and Michael Zeidler for offering me helpful advice.
    [Show full text]
  • Optimizing Windows 10, Build 2004, for a Virtual Desktop Role
    Optimizing Windows 10, Build 2004, for a Virtual Desktop role Written by Robert M. Smith, Program Manager, Azure Global Customer Engineering Date Created: May 12, 2020 Date Updated: July 08, 2020 Date Published: tbd Contributors: Tim Muessig, Senior Premier Field Engineer; Narklis Engler, Principal Program Manager Version 1.2 Document Change History Version Changes 1.0 Adding verbiage for Windows Virtual Desktop, and Windows 10 build 2004 specifically 1.1 Additional updates for 2004 1.2 Final pass, updated group policy, services, tasks, and added info about Storage Sense for disk cleanup. Introduction This article is intended to provide suggestions for configurations for Windows 10, build 2004, for optimal performance in Virtualized Desktop environments, including Virtual Desktop Infrastructure (VDI) and Windows Virtual Desktop (WVD). All settings in this guide are suggested optimization settings only and are in no way requirements. The information in this guide is pertinent to Windows 10, version 2004, operating system (OS) build 19041. The guiding principles to optimize performance of Windows 10 in a virtual desktop environment are to minimize graphic redraws and “effects”, background activities that have no major benefit to the virtual desktop environment, and generally reduce running processes to the bare minimum. A secondary goal is to reduce disk space usage in the base image to the bare minimum. With virtual desktop implementations, the smallest possible base, or “gold” image size, can slightly reduce memory utilization on the host system, as well as a small reduction in overall network operations required to deliver the desktop environment to the consumer. No optimizations should reduce the user experience.
    [Show full text]