Articles Written by Jeff Prosise

Build Secure Web Services With SOAP Headers and Extensions

Building Web services with the .NET Framework is easy'—easy, that is, unless the Web services are secure. There is no standard, agreed-upon method for exposing Web services over the Internet in such a way that only authorized users can call them. Jeff Prosise jumps into one method of tackling this now.

Understanding COM Apartments, Part II

In the completion of his two-part series on understanding COM apartments, Jeff Prosise illustrates why the lessons learned in last month's discussion of COM apartments are so important by giving concrete examples of how this knowledge can help you develop better and more efficient COM applications.

COM Security Primer, Part I

In the first of a two-part series, Jeff Prosise covers the all-important issues of COM security in terms of activation security and access security.

COM Security Primer, Part II

In the second of a two-part series Jeff Prosise focuses on remote server process identity and authentication.

Understanding COM Apartments, Part I

In the first part of a two-part series on COM apartments, Jeff Prosise describes what apartments are, why they exist, and how to avoid the problems that they introduce.

Top White Papers and Webcasts

  • Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this white paper by EMA, you'll learn how application discovery and dependency mapping can help you: Meet granular targets for availability, cost, and time-to-revenue for cloud services. Accelerate mean time to repair (MTTR) while communicating better with stakeholders. Manage even the most complex hybrid environments more efficiently and effectively Understand the …

  • Rocket Mobile® for IBM i is an enterprise mobile application development and deployment platform for customers who rely on the IBM i system. Rocket Mobile for IBM i enables customers to leave proven applications in-place and rapidly repurpose them into new managed and secure mobile applications. Fast, easy creation of mobile, web, and hybrid mobile applications that deploy to any iOS, Android, or Windows mobile phone or tablet Built-in integration for seamless repurposing of existing IBM i applications …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date