Tuesday, May 19, 2009

Hyper-V Planning and Deployment Guide

Windows Server 2008
The Hyper-V Planning and Deployment Guide is intended to help you understand the considerations you should take into account when planning to deploy Hyper-V™, and to provide installation and configuration details that will help you deploy Hyper-V.

  • Overview of Hyper-V

  • Before You Install Hyper-V

  • Installing Hyper-V

  • Configuring Virtual Networks

  • Implementing Disks and Storage

  • Appendix A: Example Authorization Manager Tasks and Operations

  • Appendix B: Authorization Manager Terminology
Hyper-V enables you to create a virtualized server computing environment using a technology that is part of Windows Server® 2008. You can use a virtualized computing environment to improve the efficiency of your computing resources by utilizing more of your hardware resources. This is possible because you use Hyper-V to create and manage virtual machines and their resources. Each virtual machine is a virtualized computer system that operates in an isolated execution environment. This allows you to run multiple operating systems simultaneously on one physical computer. 
Who will be interested in this role?
Hyper-V can be useful to you if you are:

  • An IT administrator, planner, or designer.

  • An IT architect responsible for computer management and security throughout your organization.

  • An IT operations manager who is looking for ways to reduce the total cost of ownership of their server infrastructure, in terms of both power costs and management costs.

  • A software developer or tester who is looking for ways to increase productivity by reducing the time it takes to build and configure a server for development or test use.
Microsoft Corporation
Published: March 2009
Best Regards,
Duane Aritonang
http://www.artduane.com/

Thursday, March 19, 2009

Introduction to Visual C# 2005 for Java Developers - Ramp Up



This eReference collection starts with an overview of .NET Framework and Visual C# for Java developers. It also provides material that delves into specific introductory Visual C# topics that will be useful to developers with Java experience.

Topics include
  • .NET Framework runtime
  • Comparison between Java and Visual C#
  • Assemblies
  • Language syntax
If you are a Java developer wanting to expand your skills and gain proficiency in Microsoft Visual Studio 2005, look no further! This learning track has been tailored specifically to provide you with the core information you need to start successfully developing with Microsoft Visual C# 2005 on the Microsoft .NET Framework.

Level 1: Introduction to Visual C# 2005
Developers with Java experience can start learning Visual C#. Topics include comparison of Java to C#, overview of the .NET Framework runtime, language syntax, assemblies and a Java-to-.NET API reference, Visual Studio 2005 IDE, and upgrading and deploying applications. Put your new skills to work in a virtual lab. The level concludes with a skills assessment test.

Level 2: Microsoft .NET Framework 2.0, an Introduction
Visual C# 2005 developers get an introduction to .NET Framework 2.0 programming concepts and methods. Learn .NET Framework 2.0 concepts such as core classes in the .NET Base Class Library. Topics, as they specifically apply to Visual C# 2005 and Visual Studio 2005, include system types, generics, collections, and serialization. Put your new skills to work in a virtual lab. The level concludes with a skills assessment test.

Level 3: Introduction to Data and Security
Designed to introduce Visual C# 2005 developers to core .NET Framework 2.0 development concepts centered on data and security. Topics include ADO.NET, XML, Web services, SOAP, and security. Put your new skills to work in a virtual lab. The level concludes with a skills assessment test.

Level 4: Windows Application Development Concepts
Become skilled in the basics of developing Windows applications using Visual C# 2005. Begin by reviewing application development concepts such as creating Windows forms and controls and configuring controls and creating the user interface. Then, lay the ground work for developing and deploying successful Windows applications by using Visual C# 2005 and Visual Studio 2005.

Free! Access to E-Learning Course 2926: Building Windows Forms Applications with Microsoft Visual Studio 2005—a U.S.$44.99 value! Put your new skills to work in a virtual lab. The level concludes with a skills assessment test.

Level 5: Web Application Development Basics
Find out about developing Web applications using Visual C# 2005. Begin with an introduction to Microsoft ASP.NET 2.0 followed by a study of tools and architecture. Topics include server controls, configuration, custom controls, forms authentication, building data-bound forms and deployment of Web applications.

Free! Access to E-Learning Course 2927: Building Web Applications with Microsoft ASP.NET 2.0—a U.S.$44.99 value! Put your new skills to work in a virtual lab. The level concludes with a skills assessment test.


Best Regards,
Duane Aritonang
http://www.artduane.com/

Thursday, February 12, 2009

Project Codename Teton (Hyper-V Security Guide)


Beta program for Hyper-V Security Guide

The Hyper-V Security Guide can help you elevate the security of virtualized Microsoft® Windows Server® environments to meet your business-critical needs. This guide provides IT professionals like you with guidance, instructions, and recommendations to address your key security concerns around server virtualization.

The Hyper-V Security Guide provides the following information to address your security concerns around server virtualization

Hardening Hyper-V: Prescriptive guidance for hardening the Hyper-V server role, including several best practices for installing and configuring Hyper-V with a focus on security. These best practices include measures for reducing the attack surface of Hyper-V as well as recommendations for properly configuring secure virtual networks and storage devices on a Hyper-V host server.

Delegating virtual machine management: Prescriptive guidance to help you safely and securely delegate administrative access to virtual machine resources within an organization.
Protecting virtual machines: Prescriptive guidance for securing virtual machine resources, including best practices and detailed steps for protecting virtual machines by using a combination of file system permissions, encryption, and auditing.

Download the Beta version of this Solution Accelerator, Hyper-V Security Guide-Beta.zip

This archive file contains the following documents:
  • ReleaseNotes-Beta.rtf Release notes for the Beta version of the Hyper-V Security Guide.
  • Hyper-V Security Guide-Beta.docx Beta version of the Hyper-V Security Guide.
  • Data sheet for Hyper-V Security Guide-Beta.docx Short overview description of the Hyper-V Security Guide.
Click here for instructions on where and how to provide feedback.

Want to take a Survey? click here.

Regards,
Duane Aritonang
http://www.artduane.com/

Thursday, February 05, 2009

Microsoft Pre-release Software Visual Studio 2010 and .NET Framework 4.0 Community Technology Preview (CTP)


Visual Studio 2010 and .NET Framework 4.0 mark the next generation of developer tools from Microsoft. Designed to address the latest needs of developers, Visual Studio delivers key innovations in the following pillars: Democratizing Application Lifecycle Management, Enabling emerging trends, Inspiring developer delight and Riding the next generation platform wave.

  • Democratizing Application Lifecycle Management
    Application Lifecycle Management (ALM) crosses many roles within an organization and traditionally not every one of the roles has been an equal player in the process. Visual Studio Team System 2010 continues to build the platform for functional equality and shared commitment across an organization’s ALM process.
  • Enabling emerging trends
    Every year the industry develops new technologies and new trends. With Visual Studio 2010 and .NET Framework 4.0, Microsoft delivers tooling and framework support for the latest innovations in application architecture, development and deployment.
  • Inspiring developer delight
    Ever since the first release of Visual Studio, Microsoft has set the bar for developer productivity and flexibility. Visual Studio 2010 continues to deliver on the core developer experience by significantly improving upon it for roles involved with the software development process. .NET Framework 4.0 contains numerous improvements that make it easier to develop powerful and compelling applications.
  • Riding the next generation platform wave
    Microsoft continues to invest in the market leading operating system, productivity application and server platforms to deliver increased customer value in these offerings. With Visual Studio 2010 and .NET Framework 4.0 customers will have the tooling support and the platform support needed to create amazing solutions around these technologies.
Download now! Microsoft Visual Studio 2010 and .NET Framework 4.0 (CTP)

Download the Training Kit - November Preview

Regards,
Duane Aritonang
http://www.artduane.com/

Monday, January 19, 2009

Monday, January 05, 2009

Windows 7 Developer Guide - MSDN Code Gallery

This guide summarizes the key developer advances in each of the following three areas:

Solid Foundation
Great user experiences start with a solid foundation. Windows 7 delivers a solid development platform and innovative tools that give you more options, increased application compatibility, better performance, and sophisticated document support. This results in a simple, more reliable environment for your applications and a familiar, intuitive one for your users.

We've kept the user interface consistent, predictable and easy to use, while adding multi-touch support, scrolling, and other intuitive interaction features that take advantage of the latest PC and mobile device capabilities. With Windows 7, developers have the power to build the right user experiences for their applications.

Richer Application Experiences
Windows 7 enables developers to build applications today that will run on the PCs of tomorrow. Service-enabled software and devices, such as mobile phones, portable media players, and digital cameras, demand constant connectivity and advanced applications. Windows 7 delivers a platform for both, making it easy for developers to take advantage of the functionality and features of next generation hardware, while ensuring that users are always on, and always connected.

The Best of Windows and the Web
With Windows 7, it's easy to get connected and stay connected. Windows networking offers developers options for better caching and sharing of data to improve network performance. Network diagnostics in Windows 7 give developers relevant information for monitoring network issues. Internet Explorer™ 8 is the essential platform for building fast, rich Web experiences. Whether the goal is to connect devices, connect to a network, or connect to the Internet, Windows 7 provides an enhanced platform.


Download the guide from MSDN Code Gallery.

Download the Windows 7 Beta now.

Regards,
Duane Aritonang
http://www.artduane.com/

Wednesday, November 05, 2008

FREE Microsoft Press E-Book Offer! Microsoft | Learning - Visual Studio 2008

Programming Microsoft LINQ
by Paolo Pialorsi and Marco Russo

ISBN: 9780735624009
  • Chapter 6: Tools for LINQ to SQL
  • Chapter 16: LINQ and ASP.NET




Introducing Microsoft® SilverlightTM 2, Second Edition
by Laurence Moroney

ISBN: 9780735625280
  • Chapter 1: Introducing Silverlight 2
  • Chapter 2: Using Expression Blend with Silverlight 2




Programming Microsoft® ASP.NET 3.5
by Dino Esposito

ISBN: 9780735625273
  • Chapter 3: Anatomy of an ASP.NET Page
  • Chapter 18: HTTP Handlers and Modules




And check out the following sites:
Best Regards,
Duane Aritonang
www.ArtDuane.com

Wednesday, October 15, 2008

Google has built a browser, releasing the beta version of Google Chrome (BETA) for Windows

Google has built a browser, releasing the beta version of Google Chrome.

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.


Download Chrome (BETA) - the new browser from Google

The story behind Google Chrome: Watch the video


Regards,
Duane Aritonang
www.ArtDuane.com

Friday, April 25, 2008

The Architecture Journal

The Architecture Journal
The Architecture Journal is an independent platform for free thinkers and practitioners of IT architecture. New editions are issued quarterly with articles designed to offer perspective, share knowledge, and help you learn the discipline and pursue the art of IT architecture. The Architecture Journal reaches over 53,000 subscribers worldwide.
  • Microsoft Architecture Journal Issue 16 - Call For Papers
    The next issue of the Architecture Journal will be focused on identity architecture. If you have opinions that you would like to share with the architect community on identity management, here is your chance! Follow these instructions to send an abstract before April 21st 2008 and you could see your thoughts and ideas shared with over 60,000 readers, translated in 5 languages, and distributed at multiple conferences around the world!

    April 8, 2008

  • Test-Driven Development and Continuous Integration for Mobile Applications
    A few mobile testing tools allow recording user interactions via a graphical representation of the client device but do not provide granular control over the tests. Other tools either demand scripting on a mobile device or expect tests to be executed, manually, on the device. As a result, mobile application testing is inefficient and complex, hindering productivity.

    January 1, 2008

ArtDuane.Com HeadLine

Best Regards,
Duane Aritonang
http://www.ArtDuane.com/

Monday, April 21, 2008

TechNet How-to Videos (ArtDuane.com)

TechNet How-to Videos [www.ArtDuane.com]

  • Windows Server virtualisation - solution scenarios
    The powerful new Windows Server Virtualization infrastructure will be a core feature in Windows Server codename "Longhorn". This session covers the right scenarios for server virtualization, how to identify virtualization opportunities, and the longer term strategy and roadmap for Microsoft's virtualization technologies. In this session, we will also focus on the four main solution areas for Windows Server Virtualization and provide best practices on how to evaluate the requirements for a specific virtualization solution and some key tips and tricks for effective deployment of Windows Server Virtualization.

    4/10/2008


  • Windows Server 2008 Deployment Overview
    Windows Server 2008 deployment will leverage many of the core concepts and tools provided in Business Desktop Deployment 2007 and extend those to Windows Server 2008. The new accelerator will offer comprehensive role-based guidance for all phases of deployment, aligned to IT Service Management best practices. It will also take advantage of new deployment features in System Center Configuration Manager 2007. This session introduces you to the differences between Windows Server 2003 and Windows Server 2000 deployment, and what is in store from the Solution Accelerators Team for automating Windows Server 2008 deployment.

    4/10/2008 


Best Regards,
Duane Aritonang
www.ArtDuane.com

Wednesday, February 27, 2008

Window Server 2008 grand launch (In-Person Event)

Start : Mar 4, '08 08:00am
End : Mar 4, '08 9:00pm
Location: Balai Sidang Jakarta Convention Center, Jakarta - Indonesia

Window Server 2008 grand launch

We would like to remind you of the following event: Window Server 2008 grand launch .

Please review the information below.

Event Code: 1032366346
Event Name: Window Server 2008 grand launch
Start Date: 04/03/2008
Start Time: 09:00 (GMT+07:00) Hanoi, Jakarta
End Date: 04/03/2008
End Time: 21:00 (GMT+07:00) Hanoi, Jakarta

Location:
Balai Sidang Jakarta Convention Center
Jl. Jend. Gatot Subroto
Jakarta Daerah Khusus Ibukota Jakarta 10270
Indonesia

Language(s): English.
Product(s): SQL Server, Visual Studio 2008 Professional, Visual Studio 2008 Standard and Windows Server 2008.
Audience(s): Business Professional, Government, IT Professionals, Partner and Student.
Related Industry: Agriculture, Forestry, and Fishing,Construction,Education,Financial Services,Government,Health,Hosting,Manufacturing,Media & Entertainment,Nonprofit,Other Services,Other-Unsegmented,Professional Services,Retail,Telecommunications,Transportation and Logistics,Utilities,Wholesale & Distribution.

Event Overview
The launch of windows server 2008

Registration Options Event ID:
1032366346

Add to Calendar:
http://msevents.microsoft.com/CUI/AddToOulook.aspx?EventID=1032366346&pg=search&culture=en-id

Details:
http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032366346&culture=en-id

Best Regards,
Duane Aritonang
http://Blog.ArtDuane.com
http://Store.ArtDuane.com
http://Host.ArtDuane.com
http://www.ArtDuane.com

Monday, October 08, 2007

MSDN : "How Do I" Videos - ASP.NET

If you are new to ASP.NET, you can learn the basics of how to create dynamic web applications with ASP.NET 2.0 and Visual Web Developer 2005 Express Edition, using either Visual Basic or C#.
If you have a bit of development experience, you will learn how to employ some of the great new features introduced in ASP.NET 2.0. New videos are added every week, so check back often.


Note:
Those videos designed for all ASP.NET developers, from the novice to all the professional.

Best Regards,
Duane Aritonang
http://www.ArtDuane.com

Friday, October 05, 2007

Yahoo, eBay, PayPal Partner to Fight Phishing

In advance of the holiday season, three Net giants aim to stem fraudulent e-mails.

By Nicholas Carlson

Just in time for the holiday shopping season, Yahoo Mail users may be able to expect fewer fraudulent e-mails purporting to be from eBay and PayPal. That is, if things go according to plans announced today by the three companies.

Yahoo, eBay and eBay subsidiary PayPal said they would use DomainKeys' e-mail authentication technology to block phishing messages from malicious domains. Yahoo said the technology upgrade would be rolled out globally over the several weeks to all Yahoo Mail users, enabling the e-mail provider to verify the domain from which an e-mail claims to be sent.

"Yahoo! Mail is now blocking unauthenticated messages purporting to be from eBay and PayPal based on the DomainKeys signatures, and we are able to do so because eBay and PayPal are now confident that they are signing 100 percent of their legitimate outbound mail," Mark Risher, Yahoo! Mail group product manager, told InternetNews.com.

"We think this will move the needle in terms of consumer protection and that eBay and PayPal customers worldwide using Yahoo! Mail will now have a safer e-mail experience because of it," he added. "They will begin receiving fewer fake e-mails claiming to be sent by eBay and PayPal, increasing their trust in the messages they do receive."

If the plan to weed out fake e-mails works, it may spell some relief for users long suffering from the threat of phishing. As long ago as January 2006, research firm Netcraft identified eBay and PayPal as top phishing targets, representing 62 percent of all phishing attacks in 2005.

Nevertheless, the effort may seem to have been slow in coming. The DomainKeys Identified Mail (DKIM) authentication standard that Yahoo, eBay and PayPal today agreed to adopt evidently had been ready for use for more than a year. In August 2006, the Mutual Internet Practices Association (MIPA), which developed the DKIM technical specifications, announced it had completed most of its work.

At the time, MIPA officials told InternetNews.com that the spec was stable and "just about done."

However, it wasn't until May that the specification -- which Yahoo representatives helped draft along with AOL, Cisco, Microsoft and others -- reached the final stages of being accepted by the IETF, the organization responsible for hammering out many of the Internet's standards.

Despite the elapsed time, today's news still could benefit Yahoo as it competes with rivals like Google, which did not participate in today's announcement. Google could not be reached for comment.

"Yahoo! Mail is the first Web mail service to block these types of malicious messages for eBay and PayPal through the use of DomainKeys e-mail authentication technology," Risher said. "We also hope this news will help to build momentum for continued industry adoption." Yahoo last dealt with phishing in June when security researcher Aditya K Sood posted a security advisory on a public mailing list warning that, "a severe redirection and phishing vulnerability [has] been found in Yahoo Network."

Sood said at the time that the vulnerability could have allowed some URLs on Yahoo's pages to be manipulated to redirect traffic for malicious purposes. Yahoo acknowledged the issue and quickly moved to close down the threat.

InternetNews.com Senior Editor Sean Michael Kerner contributed to this article.

read more | digg story

Best Regards,
Duane Aritonang
http://www.ArtDuane.com