|
|
|
|
|
SOA with .NET and Windows Azure : System.Transactions |
.NET 1.0 and .NET 1.1 equated single resource transactions with ADO.NET and distributed resource transactions with .NET Enterprise Services. .NET 2.0 brought these two models together as the System.Transactions library, which established a simpler and more intuitive programming model with improved performance |
|
|
|
Discovering the Microsoft Azure Platform |
Let's discover the three major components of the Microsoft Azure platform, also called the Azure services: Windows Azure, Windows Azure AppFabric, and SQL Azure. |
|
|
Windows 7 : Working at the Command Line (part 3) |
A device called CON (console) normally handles standard input and standard output, which is your keyboard and monitor. Windows 7 assumes that all command input comes from the keyboard and that all command output (such as a DIR listing or a system message) goes to the screen |
|
|
|
Windows 7 : Getting to the Command Line (part 2) - Running CMD |
You can also launch Command Prompt using the CMD executable, which enables you to specify extra switches after the cmd.exe filename. Most of these switches aren’t particularly useful, so let’s start with the simplest syntax that you’ll use most ofte |
|
Windows 7 : Getting to the Command Line (part 1) |
To take advantage of the command line and all its many useful commands, you need to start a Command Prompt session. Windows 7 offers a number of different ways to do this, but perhaps the easiest is to select Start, type command, and then click Command Prompt in the search results |
|
|
|
Windows Azure : Programming Access Control Service (part 8) |
In the previous example, you created a service namespace, token policy, and scope in ACS for processing SWT tokens generated by the web service consumer client. This example uses the same service namespace and token policy and only configures ACS to process the SAML token issued by the custom STS. |
|
|
Windows Azure : Programming Access Control Service (part 6) |
As shown in Figure 6, the call to EncodeString() fails with an unauthorized exception when executed in the context of a User role as a group claim, whereas all the methods are executed when executed in the context of an Administrator role as a group claim. |
|
|
Windows Azure : Programming Access Control Service (part 4) |
In Listing 4, trustedSolution represents your ACS service namespace, trustedAudienceValue represents the destination URL where the ACS token will be sent, and trustedSigningKey represents the token policy key associated with the token issuer your trust |
|
|
Windows Azure : Programming Access Control Service (part 2) |
To use ACS, you have to first create an ACS account from the AppFabric developer portal at http://netservices.azure.com. The provisioning process has changed over the past year from limited early adopter access through tokens to direct commercial access. |
|
|
Windows 7 : Working with Registry Entries (part 3) |
If the setting is a REG_SZ value (as it is in our example), a REG_MULTI_SZ value, or a REG_EXPAND_SZ value, you see the Edit String dialog box, shown in Figure 12.5. Use the Value Data text box to enter a new string or modify the existing string, and then click OK |
|
Windows 7 : Working with Registry Entries (part 2) |
If the setting is a REG_SZ value (as it is in our example), a REG_MULTI_SZ value, or a REG_EXPAND_SZ value, you see the Edit String dialog box, shown in Figure 12.5. Use the Value Data text box to enter a new string or modify the existing string, and then click OK |
|
|
Windows 7 : Keeping the Registry Safe |
The sheer wealth of data stored in one place makes the Registry convenient, but it also makes it very precious. If your Registry went missing somehow, or if it got corrupted, Windows 7 simply would not work. |
|
|