Making secure is hard from a technology point of view. As Juval Lowy is saying in this MSDN article: Security is by far the most intricate area of the Windows® Communication Foundation (WCF). In every WCF operation call on the service side, security is governed by the service contract, the o...
[More]
18. December 2007
Clemens
One of the most “technical” challenging phase of a project is the transition of code from the development environment through the integration and test environments into production with Installer Packages. Within most companies developers are responsible for the creation of Installer Packages. The...
[More]
13. December 2007
Clemens
Did this morning the ALM Quick Assessment, not for a specific company our development department, but more the way I think most companies work now days. The results... [the vertical scale is 0 to 5] I'm a pessimist, my score is much lower than industry average, specially about the developmen...
[More]
12. December 2007
Clemens
I'm not fully up and running with the Rosario CTP, but found yesterday evening some time to dig into the internals of Team Architect. [Reflector rules] Getting information out off the designers.It is pretty hard to iterate through the various applications and endpoints within the VS2005 and V...
[More]
Very useful, these mini-stories founded on the CTP10 desktop
Walkthrough: Visualizing Interaction Sequences Between Service-Oriented Applications
Walkthrough: Designing and Visualizing Classes and Their Interactions
Walkthrough: Building Windows Communication Foundation Web Services Usin...
[More]
29. November 2007
Clemens
1: The Designer Bus,
No documentation about this yet.
It makes integration of models allot easier. For example the integration between the Application Diagram and the Service Models or the Sequence Diagrams.
2: Using the Distributed System Designers and the Web Serv...
[More]
26. November 2007
Clemens
In an ideal "SOA" world, business-services have a business driver or at least some one from the business who is responsible for it [knows something about the data and operations that service exposes] and has information who is consuming, is going to consume the service and who is allowed t...
[More]