Radical Development

Technical Without the Technicalities

Microsoft Enterprise Library: Data Access Application Block


For those of you who have been using the Enterprise Library from Microsoft then I tip my hat to you. I admit that I have not used this library for a number of years and in most cases the reason is because I have honestly not been in a position to do so. It is a long story so don’t ask. There are a number of reason why you should seriously consider the use of the Enterprise Library and I cannot think of any better reason than those provided directly from Microsoft. The goals of Enterprise Library are the following: … Continue reading

Creating Charts With Microsoft Chart Controls


There is no shortage of charting controls for the Microsoft .NET framework and while many do a great job, they may be overkill and costly to any project. If you’re not familiar with the Microsoft Chart Controls then you may find that you’re in for a pleasant surprise for two reasons; They are free Quickly render charts Quick Walkthrough My purpose here is simple and to the point. I want to demonstrate just how easy it is to return a chart to the end user. In this case I will be using an XML data source rather than a database … Continue reading

Security Development Lifecycle: SQL Injection Attacks


In an earlier post titled Security Development Lifecycle: Introduction I begun introducing what the Security Development Lifecycle (SDL) represents and as I continue this series I will focus on the SDL model that Microsoft has so graciously provided to the community. Introduction In part 2 of this series I want to focus of SQL Injection and for those of you just getting started it is important to understand what a SQL Injection attack is. Here is what Microsoft has stated: SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance … Continue reading

Ten Most Critical Web Application Security Risks


I thought it was time to sit down and begin writing a series of articles on the subject of application security for a number of reasons. First, because security should and must be foremost in everyone’s mind and second I have decided to return to school to obtain a Master’s Degree in CyberSecurity. I can think of no better reasons to both educate myself and other surrounding to topic of security. Introduction If you’re not familiar with The Open Web Application Security Project (OWASP) then I strongly urge you to take time to visit them. The amount of information you … Continue reading

Free Microsoft .NET Development Resources


CSharp CSharp School First Edition: The Programmer’s Heaven C# School book covers the .NET framework and the C# language. Starting with the basics of the language, it goes on to cover object oriented programming techniques and a wide range of C# languages features including interfaces, exceptions and delegates. Later chapters cover practical topics including database access with ADO.NET, building Windows forms applications, multi-threading and asynchronous I/O. The final chapter covers new features in C# 2.0, including generics. Threading in C#: C# supports parallel execution of code through multithreading. A thread is an independent execution path, able to run simultaneously with … Continue reading

Pluralsight Teams Up With DreamSpark And Offers Free 90 Day On-Demand Training


I must say that the fine folks over at Pluralsight continue to share their outstanding training content in a fashion that opens doors up to many either in the development community or those currently in school. It never ceases to amaze me just how much the Pluralsight community believes in what they are doing and if I may say so they do an outstanding job! Most recently Pluralsight has teamed up with DreamSpark where all worldwide verified DreamSpark members can obtain a 90-day Pluralsight On-Demand subscription. Not bad at all and you if have never attended one of their course … Continue reading

N-Tier Architecture Example


In software engineering, multi-tier architecture (often referred to as n-tier architecture) is a client–server architecture in which the presentation, the application processing, and the data management are logically separate processes. For example, an application that uses middleware to service data requests between a user and a database employs multi-tier architecture. The most widespread use of multi-tier architecture is the three-tier architecture. N-tier application architecture provides a model for developers to create a flexible and reusable application. By breaking up an application into tiers, developers only have to modify or add a specific layer, rather than have to rewrite the entire … Continue reading