Articles Written by Jeff Prosise

Build Secure Web Services With SOAP Headers and Extensions

Building Web services with the .NET Framework is easy'—easy, that is, unless the Web services are secure. There is no standard, agreed-upon method for exposing Web services over the Internet in such a way that only authorized users can call them. Jeff Prosise jumps into one method of tackling this now.

Understanding COM Apartments, Part I

In the first part of a two-part series on COM apartments, Jeff Prosise describes what apartments are, why they exist, and how to avoid the problems that they introduce.

Understanding COM Apartments, Part II

In the completion of his two-part series on understanding COM apartments, Jeff Prosise illustrates why the lessons learned in last month's discussion of COM apartments are so important by giving concrete examples of how this knowledge can help you develop better and more efficient COM applications.

COM Security Primer, Part I

In the first of a two-part series, Jeff Prosise covers the all-important issues of COM security in terms of activation security and access security.

COM Security Primer, Part II

In the second of a two-part series Jeff Prosise focuses on remote server process identity and authentication.

Top White Papers and Webcasts

  • Today's agile organizations pose operations teams with a tremendous challenge: to deploy new releases to production immediately after development and testing is completed. To ensure that applications are deployed successfully, an automatic and transparent process is required. We refer to this process as Zero Touch Deployment™. This white paper reviews two approaches to Zero Touch Deployment--a script-based solution and a release automation platform. The article discusses how each can solve the key …

  • On-demand Event Event Date: December 18, 2014 The Internet of Things (IoT) incorporates physical devices into business processes using predictive analytics. While it relies heavily on existing Internet technologies, it differs by including physical devices, specialized protocols, physical analytics, and a unique partner network. To capture the real business value of IoT, the industry must move beyond customized projects to general patterns and platforms. Check out this webcast and join industry experts as …

Most Popular Programming Stories

More for Developers

RSS Feeds