Read more
Company will replace power cords on 14.1 million consoles, following electrical-component failures in 30 machines.
Read more
Read more
Microsoft security researchers are warning about a new generation of powerful system monitoring programs, or "rootkits," that are almost impossible to detect using current security products and that could pose a serious risk to corporations and individuals.
Read more
Read more
This memo defines an extension to the SMTP service that helps receiving e-mail servers determine whether the SMTP client is authorized to transmit mail on behalf of the responsible submitter's domain.
Read more
Read more
MSF for Agile Software Development is a scenario-driven, context-based, agile software development process that utilizes many of the ideas embodied in Team System.
Read more
Read more
This document outlines the steps you should take to upgrade from Microsoft Systems Management Server (SMS) 2003 to Microsoft Systems Management Server 2003 Service Pack 1 (SP1).
Read more
Read more
PUBLISHED December 2003. Detailed discussion of how Microsoft IT installed a Public Key Infrastructure, built originally with Windows 2000 Server Certificate Services and later upgraded with Windows Server 2003, to implement a secure communications and remote authentication infrastructure.
Read more
Read more
PUBLISHED August 2003. Microsoft needed to use e-mail for transmitting business-sensitive data but was concerned about security and data privacy.
Read more
Read more
MSF for Agile Software Development is a scenario-driven, context-based, agile software development process that utilizes many of the ideas embodied in Team System.
Read more
Read more
This document specifies the hardware and software requirements necessary to implement and maintain MicrosoftÂ
Systems Management Server (SMS) 2003 Service Pack 1 (SP1) in your environment.
Read more
Systems Management Server (SMS) 2003 Service Pack 1 (SP1) in your environment.Read more
Japanese programmers spotlight flaw in Redmond's antipiracy protections, but the company moves to block the hack.
Read more
Read more
Introduces a .NET Framework security system called Code Access Security (CAS), which helps centralize trust decisions.
Read more
Read more
Scott Mitchell examines how to implement a common mathematical construct, the set, which is an unordered collection of unique items that can be enumerated and compared to other sets in a variety of ways.
Read more
Read more
Scott Mitchell espouses on graphs, a collection of nodes and edges with no rules dictating the connection among the nodes, and one of the most versatile data structures.
Read more
Read more
Scott Mitchell provides a quick examination of AVL trees and red-black trees, which are two different self-balancing binary search tree data structures. He also covers skip lists, an ingenious data structure that turns a linked list into a data structure that offers the same running time as the more complex self-balancing tree data structures.
Read more
Read more
Scott Mitchell looks at a common data structure that is not included in the .NET Framework Base Class Library, binary trees. A binary search tree, or BST, allows for a much more optimized search time than with unsorted arrays.
Read more
Read more
Scott Mitchell delves into three of the most commonly studied data structures: the Queue, the Stack, and the Hashtable. He goes on to explain the pros and cons of each individual data structure.
Read more
Read more
Scott Mitchell examines two of the most commonly used data structures present in the .NET Framework: the Array and List.
Read more
Read more
As security firms brush off Microsoft's anti-spyware plans, analysts point out that given time, the software giant could become a bigger threat.
Read more
Read more
The BizTalk 2004 Adapter for MSMQ provides support for sending and receiving messages using MSMQ 2.0 and 3.0, and takes advantage of the new features in MSMQ 3.0.
Read more
Read more