You are here

Feed aggregator

Is Microsoft abandoning TFVC in favor of Git?

MSDN Blogs - Mon, 04/14/2014 - 07:22

No.

This is an example of the power of social media.  I had planned to ignore it but I’ve had enough requests for “official confirmation” that I guess I have to say something :).

Last week someone tweeted “Microsoft phasing out the TFS version control repository and moving to Git. Unofficially confirmed at a TFS presentation”

It caught on and created a minor retweet storm.

It’s simply not accurate.  I’ve been told it was the result of a misunderstanding generated in a hallway conversation between one of our MVPs and a customer at a presentation on TFS.  Misunderstandings happen – it doesn’t worry me.  Social media just allows them to go global quickly :)

As I said when I announced Git support in VS/TFS, our intent is to provide the best centralized version control system and the best distributed version control system.  We fully intend to support both, enhance both, etc indefinitely.  Both types of version control are useful to different teams and both benefit from the tight integration and enterprise class hosting that we can provide inside TFS and Visual Studio.  At the moment, a significant majority of our customers use TFVC.  That may or may not change over time.  But you can bet that we will continue to work to make both great.

Some will observe that, lately, all our new development work has been in Git features.  That’s accurate.  That’s simply a reflection of how much further behind Git is, for instance, it’s not supported by code review, CodeLens, My Work, branch visualization and more.  We’re working hard to get our Git support up to parity with our TFVC support.  In general though, for now and for the future, when we build new features, we try to build them in a way that works well for both Git and TFVC.  An example of this is that, as we’ve improved the version control web UI over the past 6 or 9 months, we’ve done it in a way that both the TFVC and Git experiences have gotten better.  That’s not an accident – it’s deliberate.

Hopefully this settles the issue and provides an “official statement” that people can point to in order to feel confident where we stand.

Thanks,

Brian

The geeky thrill of discovering that two things are really the same thing, just with different labels

MSDN Blogs - Mon, 04/14/2014 - 07:00

Today's post about binomial coefficients was intended to be a warm-up for Catalan numbers, but it turns out Eric Lippert already covered them, first in the context of binary trees, then in the context of arbitrary trees and forests, and then again in the context of matched parentheses. Another way of seeing the correspondence between forests and matched parentheses is simply to consider each { as an XML open-tag and each } as an XML end-tag.

One thing to take away from the enumeration of objects controlled by Catalan numbers is that when you see multiplication in a recurrence relation, that typically corresponds to a nested loop. (We saw this ourselves when we studied Stirling numbers of the second kind.)

The correspondence between binary trees and arbitrary forests is done by simply renaming variables: left­Child and right­Child turn into first­Child and next­Sibling.

Renaming variables also reveals an interesting equivalence between the two algorithms for reversing a linked list. One technique is to do link rewriting:

Node *Reverse(Node *head) { Node *prev = nullptr; while (head) { // The node we are rewriting Node *current = head; // Advance to next node before // we overwrite the outbound pointer head = current->next; // Repoint to previous node current->next = prev; // Advance the trailing pointer prev = current; } return prev; }

Another technique is to pop nodes off one list while pushing them onto another.

Node *Reverse(Node *head) { Node *result = nullptr; while (head) { // Pop Node *current = head; head = current->next; // Push current->next = result; result = current; } return result; }

But if you look more closely at the two versions, you'll see that they are not really two algorithms. They are the same algorithm, just with different comments and variable names!

One of my colleauges used this as an interview question and guided candidates through both algorithms, only to discover later that they were actually the same algorithm, merely viewed through different-colored glasses.

Enumerating subsets with binomial coefficients

MSDN Blogs - Mon, 04/14/2014 - 07:00

Inspired by the Little Program which enumerates set partitions, I decided to do the binomial coefficients this week. In other words, today's Little Program generates all subsets of size k from a set of size n.

As before, the key is to interpret a recurrence combinatorially. In general, when a recurrence is of the form A + B, it means that at the recursive step, you should do A, followed by B. In our case, the recurrence is C(n, k) = C(n − 1, k) + C(n − 1, k − 1). The combinatorial interpretation of the recurrence is to look at how you can go from a set of size n to a set of size n − 1 by studying the effect of removing element n. If element n is not part of the subset, then what's left is a subset of size k. If it is part of the subset, then removing it leaves a subset of size k − 1.

Therefore, our algorithm goes like this:

  • Handle base cases.
  • Otherwise,
    • Recursively call C(n − 1, k) and pass the results through.
    • Recursively call C(n − 1, k − 1) and add element n to each of the results.

As usual, once we spelled out what we're going to do, actually doing it is pretty straightforward.

function Subsets(n, k, f) { if (k == 0) { f([]); return; } if (n == 0) { return; } Subsets(n-1, k, f); Subsets(n-1, k-1, function(s) { f(s.concat(n)); }); };

The first test catches the vacuous base case where you say, "Please show me all the zero-sized subsets of a set of size n." The answer is "There is exactly one zero-sized subset, called the empty set."

The second test catches the other base cases where you say, "Please show me all the k-sized subsets¹ of the empty set." This can't be done if k > 0, because the only subset of the empty set is the empty set itself, and its size is not k.

The meat of the recurrence is pretty much what we said. First, we generate all the k-sized subsets from a set of size n-1 and pass them through. Then we generate all the First, we generate all the k-1-sized subsets from a set of size n-1 and add the element n to them.

We can test out the function by logging the results to the console.

Subsets(5, 3, logToConsole);

For style points, we can accumulate the results in helper parameters. This records the pending work in parameters instead of closures, which makes the code easier to port to languages which don't support closures. (And probably helps the efficiency a bit too.)

function AccumulateSubsets(n, k, f, chosen) { if (k == 0) { f(chosen); return; } if (n == 0) { return; } AccumulateSubsets(n-1, k, f, chosen); AccumulateSubsets(n-1, k-1, f, [n].concat(chosen)); }; function Subsets(n, k, f) { AccumulateSubsets(n, k, f, []); }

(I prepend n to chosen for extra style points, since it causes the results to be enumerated in a prettier order.)

As with Stirling numbers, we can use a destructive recursion to reduce memory allocation, if we can count on the callback not modifying the result. I'll leave that as an exercise, because I've got something even better up my sleeve: Getting rid of the recursion entirely!

Let's consider the case of enumerating all the subsets of size k for a fixed k known at compile-time. Let's say k is 3. You can structure this as a series of nested loops.

function Subsets3(n, f) { for (var i = 1; i <= n - 2; i++) { for (var j = i + 1; j <= n - 1; j++) { for (var k = j + 1; k <= n; k++) { f([i, j, k]); } } } }

The outer loop chooses the first element, the middle loop chooses the second element, and the inner loop chooses the last element. This clearly generalizes to bigger subsets; you just need more loop variables.

With this interpretation, you can see how to get from one subset to the next subset: You increment the last element, and if that's not possible without violating the loop constraint, then you back out one level and try incrementing the next-to-last element (and restarting any inner loops), and so on, backing out until you finally find an index that can be incremented (or give up).

function NextSubsetSameSize(s, n) { var k = s.length; // look for an index that can be incremented for (i = k - 1; i >= 0; i--) { // can this index be incremented? if (s[i] < n - k + i + 1) { // increment it s[i]++; // reset all inner loops while (++i < k) s[i] = s[i-1] + 1; return true; } } return false; }

The loop on i looks for the highest index that can be incremented. The loop bounds depend on which index you are studying, since lower indices need to leave enough room for higher indices, but can you figure out the formula by looking at the pattern in Subset3. Once we find an index with room, we increment it and reset all the subsequent indices to their initial values. If we can't find an index to increment, then we report failure.

// Enumerate all subsets of size 3 from a set of size 5 var s = [1, 2, 3]; // initial subset do { console.log(JSON.stringify(s)); } while (NextSubsetSameSize(s, 5)); Note

¹ In math circles, the phrase k-sized subsets is typically abbreviated as k-subsets, but I chose to spell it out here because the shorthand takes some getting used to.

Accelerate your Insights Live Event – featuring Power BI for Office 365

MSDN Blogs - Mon, 04/14/2014 - 06:31

Accelerate your Insights

How data and insights are driving innovation

All organisations are seeing huge opportunities to use data and insights to create a virtuous engagement cycle with their customers and stakeholders, delivering improved customer value propositions and operational excellence.

In order to achieve these goals, employees require powerful and easy to use tools to enable them to discover and use insights to make effective decisions, customers want to use personalised, high performance and convenient online services and IT requires a secure, scalable and comprehensive information platform.

Want to learn more? Join us to see how to drive real-time business, from apps to insights, through a deeper look into the comprehensive in-memory technologies in Microsoft SQL Server 2014, Power BI for Office 365, SQL Server Parallel Data Warehouse, and Windows Azure HDInsight.

REGISTER HERE

Attending this one-day event will allow you to get a running start on understanding the extensive innovations we’re delivering around data that will empower your business with the tools you need to quickly uncover business insights and make smarter business decisions.

Morning Agenda 9:00 – 12:30

9:00 – 9:45 Registration and Breakfast

9:45 – 10:45   Keynote, Quentin Clark CVP Data Platform Group

Rafal Lukawiecki – Project Botteceli
Dan Sommer – Gartner Research Director


11:15 – 12:30, Customer Case Study Sessions
Jabil – Self Service BI in Manufacturing

Afternoon Agenda 1:00 – 5:00

Har du en ledig stilling, som du ikke kan rektruttere til?

MSDN Blogs - Mon, 04/14/2014 - 05:51

Kære Partner,

Vi hører i øjeblikket, at der mangler ledige ressourcer og at rektruttering er rigtig dyrt!

For at løse dette, har Microsoft og Firebrand Training skabt et nyt rekrutterings- og uddannelsesprogram Firebrand Academy. Her rekrutteres og trænes unge kandidater til værdiskabende, certificerede konsulenter inden for Microsoft produkter – hurtigt!

Udover de tekniske Microsoft kompetancer og certificeringer, så indeholder de accelerede uddannelsesprogrammer også træning i sociale færdigheder, som kandidaten skal have for at blive en produktiv og værdiskabende konsulent.

Med andre ord – en fuldstændig løsning på din mangel på ressourcer.

Det eneste du skal gøre er, at ringe eller skrive til Firebrand Academy på telefon 78 77 29 14 / e-mail academy@firebrandtraining.dk, så klares alt det besværlige for dig:

  • Tekstning af stillingsopslag
  • Markedsføring af det ledige job
  • Test og udvælgelse af kandidat til videre dialog med dig
  • Varetagelse af kommunikationen med kandidaterne
  • Uddannelse og certificering af den kandidat, som du ansætter – hurtigt!

Se yderligere information på firebrandtraining.dk/academy

Med venlig hilsen

Dynamics Teamet

Windows Phone 8.1 Developer Preview is Now Available

MSDN Blogs - Mon, 04/14/2014 - 05:41

Windows Phone 8.1 developer preview is now available however you need to install Preview for Developers app on your Windows Phone first. Note that the update is available for ALL existing Windows Phones 8 running devices including low end phones. The app enables you to receive pre-release OS updates on dev phone, directly from Microsoft! However please note that one of the following three requirements hold true to use this update,

(a) have an active Windows Phone Dev Center account;

(b) have an active App Studio account;

(c) be running a registered developer device (‘dev unlocked’ phone)"

After installing this app, go to Phone Settings > Phone Update and look for updates. Given you're already running latest version of GDR 3, you'll first get a minor update but don't just stop there. Try updating again to get actual 8.1 update which is approximately 500 MB in size.

Happy CORTANA Everyone :)

Edit: 
For Cortana, don't change your region. Simply set US keyboard as your primary keyboard. (After update is installed, change the keyboard and reboot the phone)

Image Courtesy: Joe Belfiore 

Windows Phone 8.1 for Developers–Web Authentication Broker

MSDN Blogs - Mon, 04/14/2014 - 05:30

This blog post is part of a series about how Windows Phone 8.1 affects developers. This blog post talks about how you can use the web authentication broker to authenticate and is written by Andreas Hammar (@andyhammar) at Jayway and was originally posted here.

Intro

Authentication using external services using OAuth/OpenID instead of rolling your own is increasing in popularity for a good reason – it’s a great practice. The Web Authentication Broker (WAB) is a component to simplify this scenario.

The WAB provides these features:

· A simple API

· An integration of the web page of the credentials provider in a system user interface

· Isolation of credentials from the app

 

API

The core API method of the WAB is AuthenticateAndContinue, which also has overloads with more or less options.

AuthenticateAndContinue(Uri requestUri, Uri callbackUri)

The requestUri is the composed uri for the service containing the appSecret etc, the callbackUri is the uri that your app has registered with the service provider. The WAB will listen for a redirect to this uri, stop itself and return the redirect token from the service to the app.

The former is the method used for Single Sign-On (SSO). By not providing a callbackUri, the WAB will use the appId of the phone app as the callbackUri. So for multiple apps to be able to create a SSO scenario, they all have to be registered with their appId as callbackUri. The appId can be viewed using WebAuthenticationBroker.GetCurrentApplicationCallbackUri, an example of it is (eg ms-app://s-1-15-2-1385422425-1305518605-1648009019-4128168865-474403130-3627659409-3578358421/.

Just to give you an example, the start and return uris for Twitter might look like this:

Start:

https://api.twitter.com/oauth/authorize?oauth_token=BzfZ7XXXXXXXXXXXXXXXXXXXXXXXaotpYM

Return:

http://jayway.com/?oauth_token=4XLD6dfXXXXXXXXXXXXXXXXXXXXcIQf7S10&oauth_verifier=Fu7yXXXXXXXXXXXXXXXXXXXXXXXXXXXrpPcKYQ

 

What it looks like

When launching the WAB, it shows a standardized UI with the web page of the service provider. After submitting the credentials, the WAB will also ask whether to remember the credentials.

 

Convergence with Windows You guessed it, also this class exists on Windows and behaves exactly the same. The authentication UI on Windows has the luxury using some screen real estate to show the originating app’s UI dimmed

Bishop Auckland College Case Study

MSDN Blogs - Mon, 04/14/2014 - 05:00

Based North of Darlington in County Durham, Bishop Auckland College is a further education college with over 5,000 full and part time students.

The college initially approached Phoenix Software to tender for the renewal of its Microsoft campus licences. However, once Phoenix demonstrated how the college could take advantage of a new Microsoft licensing scheme to give every student a copy of Microsoft Office without having to spend any more on its software licensing, the scope of the project soon expanded to include a server migration and Office 365 deployment.

Challenge   
With its Microsoft licence agreements due to expire, Bishop Auckland College issued a formal tender to three local companies to bid for the renewal contract. Phoenix Software differentiated itself by recommending that the college leverage Microsoft’s new Student Advantage programme, which had launched just nine days prior to Phoenix Software’s proposal.During further consultation with the college, Phoenix Software also determined that the college’s three ageing email servers (which were running Microsoft Exchange 2003) were not only causing considerable disruption to the college, but would also prevent it from taking full advantage of the comprehensive feature sets available in the new Microsoft software that the college was looking to purchase.  

Solution
As per its initial response to the tender, Phoenix recommended that the college make full use of the Student Advantage licensing scheme when renewing its core Microsoft licences. This would allow the college to provide every student with a
subscription to Office 365 at no extra cost. Phoenix Software also recommended upgrading the college’s three onsite email servers so as to take full advantage of the Office cloud and the new features available with its new Microsoft licensing agreements. Phoenix proposed a hybrid cloud/on-premise solution whereby the student email server would be decommissioned entirely and all email accounts migrated to the Office 365 cloud (since cloud email is a feature included within the Office 365 licence), while the two remaining onsite servers would be upgraded to Microsoft Exchange 2010 so that the college could take full advantage of the features available with the latest versions of Office. It was determined that upgrading all three servers could be completed within the college’s existing licensing agreements, so no additional licence purchase was necessary.

Wayne Longton-Worley, IT Services Manager at Bishop Auckland College commented, “We chose Phoenix because of their highly consultative approach at every stage of the tender process. They asked us more questions than anyone else in order to find the best solutions for us. What’s more, of all the companies we spoke to, they were the only ones to suggest the Student Advantage programme and server improvements, which proved to deliver so much more additional value.”

The college wished to deploy the upgrades during the Christmas holidays to allow for testing and decommissioning of the old systems. By conducting both projects in parallel over the Christmas holidays, the college would also save itself considerable disruption. Phoenix delivered the project on time. “Phoenix were realistic but ambitious with their timescales. But they delivered as promised. They said it would take 10 days and it took 10 days,” said Longton-Worley.

Benefits
Enrolling the college in the Student Advantage programme immediately extended the scope of the college’s new licensing agreements by providing every student with a copy of Office via the Office 365 subscription, for no extra charge to the college. Over 1,000 students took advantage of the Office 365 subscription in the first eight weeks alone and the college continues to receive daily enquiries. In addition to providing all students with Office 365, the introduction of a common software standard also solved a problem that had been plaguing the college for some time – that of software incompatibility. Since students no longer had to resort to using bootleg or free software that was invariably incompatible with the official Microsoft software used on campus, students could now take full advantage of the features of Office applications knowing that the same results could be replicated at home, and that staff would view their assignments in the exact same way that they were conceived.

  • Since Office 365 is a comprehensive suite of cloud-based services, students have been able to leverage a number of additional benefits;

  • Students can now work on files from anywhere and on any device, without the risk of version conflicts or the loss of important work as information is saved in real time.

  • Every student gains 25GB of online storage in Microsoft OneDrive (in addition to a 50GB mailbox), so the college no longer needs to maintain costly onsite storage facilities for its students.

  • The inclusion of Microsoft Lync with Office 365 also means that students can collaborate and share work more effectively, and staff can make themselves available to students in a more collaborative fashion.

Due to Phoenix Software’s quick thinking, Bishop Auckland College is also one of the first colleges to have benefitted from the Student Advantage programme in the UK, providing it with a significant differentiation for attracting more students over its nearby rivals. Looking beyond the benefits of Student Advantage, the new hybrid cloud/on-premise server configuration has yielded numerous enhancements too. With the students’ email services now managed entirely by Microsoft, the college has one less email server to power, upgrade and maintain, while upgrading the college’s two remaining onsite servers to Exchange 2010 has enabled it to take advantage of a more sophisticated and reliable email
service for its staff . What’s more, the seamless compatibility between the on-premise solution and the cloud services has enabled the college to experiment with moving selective groups of staff over to the Microsoft cloud too, helping to prepare
the college for a potentially server-free future.

Wayne concludes “What started out as a simple licensing conversation has resulted in so much additional value for Bishop Auckland College. This was much more than a simple licensing renewal - it has brought the college thoroughly up-to-date! Most importantly of all, we have gained without having to spend any more money on licences. This is a credit to Phoenix Software’s deep understanding of our needs and the broader software market, and its professional approach to
matching the two.”

Visual Studio Online Update – Apr 8th

MSDN Blogs - Mon, 04/14/2014 - 04:59

You probably didn’t notice that we did our sprint 63 deployment last week.  I didn’t blog about it because there wasn’t much to say.  We announced a whole bunch of new stuff at Build the week before and there wasn’t much new in sprint 63 beyond consolidating on the Build feature set and preparing for our next event – TechEd in early May.  I suspect next sprint’s deployment will also be light as it’s the last deployment before TechEd and most of the work will be preparing for those announcements.  I hope to see you at TechEd and, if not, I’ll see you online.

Brian

New Azure Portal Overview

MSDN Blogs - Mon, 04/14/2014 - 04:53

Brian Keller did a very nice blog post on how you can use the new Azure portal to create a super cool devops dashboard: http://blogs.msdn.com/b/briankel/archive/2014/04/10/building-your-dream-devops-dashboard-with-the-new-azure-preview-portal.aspx

Brian

No registration, just reset my password please!

MSDN Blogs - Mon, 04/14/2014 - 04:13

One of the challenges customers face to achieve a successful deployment of SSPR is depending on their end users to execute the bothersome task of account registration. 

There is couple of straight-forward solutions to assist users completing the registration process. Email reminders can be sent to only the unregistered users by applying a notification workflow with a dynamic set to filter out the registered accounts.

Another common solution is to simply rely on the influence of the registration portal after the FIM client has been deployed to the users machines. If the user is unregistered, by default, the portal will open each time the user logs in to complete the registration.

But these solution are not always fully effective. What if you don't want to hunt down the insubordinate?

 An alternative route which doesn't require user compliance, is auto-registration. In some scenarios registration is not necessary if the information needed for the registration can be obtained from another trusted system. This method can be applied to QA Gate, One-Time Password SMS Gate and One-Time Password Email Gate.

 The following process explains one of the approaches to configure SSPR using One-Time Password SMS Gate with auto-registration by importing user's mobile numbers from the HR system:

  1. Import the mobile number value from the HR system to the "mobilePhone" attribute in the MV. Ensure that the number is imported with the same format that your SMS gateway supports!
  1. From the "Configure Attribute Flow" tab in the FIM Management Agent Designer, export the "mobilePhone" attribute from the MV to the "msidmOneTimePasswordMobilePhone" attribute in the FIM portal:

If you can't see the attribute "msidmOneTimePasswordMobilePhone" listed under the Data Source Attribute, then click on the "Select Attributes" tab in the FIM Management Agent Designer and check "Show All."

  1. Now, in server running FIM Service, create a new scheduled task (taskschd.msc) to run the PowerShell script (Download Link) that will query all of the unregistered users assigned with value in the "msidmOneTimePasswordMobilePhone" attribute and register them for the SSPR authentication workflow.

You can configure the task to run once at night or another time you see appropriate for your company. 

Be sure the task is running under a FIM Administrator account or at the minimum permission, an account which has permission to retrieve the users and to update the "AuthNWFRegistered" attribute.

 

 

Conclusion

 Applying this approach is always depends on your SSPR design and available data from other systems. I had many cases where customer wants only to use the SMS challenge for users to reset their password and their mobile numbers already updated in the HR system! In these cases using the above approach make more sense.  

 Hope that helped :) drop me a comment if you had any questions.

 

/Salam/

 

DISCLAIMER

All information within this article is provided as is. I cannot guarantee that editing the registry, executing the provided code or scripts, or performing any other action described in this article will not cause serious damage. I am also not responsible content on external sites. Use this information at your own risk! 

 

e-knihy zdarma: MS SQL 2014, Programming Windows Store Apps a další

MSDN Blogs - Mon, 04/14/2014 - 04:04
Společnost Microsoft vydává mnoho elektronických knih, které si můžete zdarma stáhnout do svých počítačů a čteček. Z dubnových novinek jsem vybral dvě: Introducing Microsoft SQL Server 2014 Ross Mistry and Stacia Misner, April 2014, 125 pages In this book, the authors explain how SQL Server 2014 incorporates in-memory technology to boost performance in online transactional processing (OLTP) and data-warehouse solutions....(read more)

de:code ロゴ入り モレスキンノートブックが 400 名様に当たります!

MSDN Blogs - Mon, 04/14/2014 - 02:45
今年度最大のテクニカル イベント de:code の情報をいち早くメールで配信するサービス『de:code アップデート』を実施しています。 de:code の詳細内容をはじめ、イベント終了後にはキーノートやセッション資料の公開情報についてもご連絡します。 また、ご登録いただいた方の中から抽選でドーンと 400 名様に de:code ロゴ入り モレスキン ノートブックをプレゼント。登録方法はメール アドレスを記入するだけ。是非お気軽にご登録ください。 ★ モレスキンプレゼントキャンペーン詳細情報を見る ★ de:code イベント詳細情報を見る...(read more)

Windows Phone 8.1 Enterprise Security Overview

MSDN Blogs - Mon, 04/14/2014 - 02:36

 Download the overview of the enterprise-level security features available in Windows Phone 8.1.

“From highly secure identity features, such as Multi-Factor Authentication (MFA) with virtual smart cards and PINs to its defense-in-depth, multilayered approach that addresses organizational security requirements in numerous ways, Windows Phone 8.1 is designed with security in mind. Explore these features in more detail and learn why, because Windows Phone 8.1 shares many of the same underlying components, including those related to security, as Windows 8.1 and Windows Server 2012 R2 operating systems, it offers predictability, reliability, and commonality in how Windows Phone 8.1 devices can be used and managed in an enterprise environment”

Download the overview of the enterprise-level security features available in Windows Phone 8.1.

Rob

Technorati Tags: ,,

Download the official Indian Premier League app for Windows Phone

MSDN Blogs - Mon, 04/14/2014 - 02:27

I am a big fan of the IPL (Indian Premier League) and it is great to see the official app being released for Windows Phone.

Download the official Indian Premier League app for Windows Phone

   

Download the official Indian Premier League app for Windows Phone

Will be interesting to see how KP gets on with the Delhi Daredevils.

Rob

Technorati Tags: ,,,,,

Accelerate your Insights Live Event – featuring Power BI for Office 365

MSDN Blogs - Mon, 04/14/2014 - 02:08

Accelerate your Insights

How data and insights are driving innovation

All organisations are seeing huge opportunities to use data and insights to create a virtuous engagement cycle with their customers and stakeholders, delivering improved customer value propositions and operational excellence.

In order to achieve these goals, employees require powerful and easy to use tools to enable them to discover and use insights to make effective decisions, customers want to use personalised, high performance and convenient online services and IT requires a secure, scalable and comprehensive information platform.

Want to learn more? Join us to see how to drive real-time business, from apps to insights, through a deeper look into the comprehensive in-memory technologies in Microsoft SQL Server 2014, Power BI for Office 365, SQL Server Parallel Data Warehouse, and Windows Azure HDInsight.

REGISTER HERE

Attending this one-day event will allow you to get a running start on understanding the extensive innovations we’re delivering around data that will empower your business with the tools you need to quickly uncover business insights and make smarter business decisions.

Morning Agenda 9:00 – 12:30

9:00 – 9:45 Registration and Breakfast

9:45 – 10:45   Keynote, Quentin Clark CVP Data Platform Group

Rafal Lukawiecki – Project Botteceli
Dan Sommer – Gartner Research Director


11:15 – 12:30, Customer Case Study Sessions
Jabil – Self Service BI in Manufacturing

Afternoon Agenda 1:00 – 5:00

Accelerate your Insights Live Event – featuring Power BI for Office 365

MSDN Blogs - Mon, 04/14/2014 - 02:08

Accelerate your Insights

How data and insights are driving innovation

All organisations are seeing huge opportunities to use data and insights to create a virtuous engagement cycle with their customers and stakeholders, delivering improved customer value propositions and operational excellence.

In order to achieve these goals, employees require powerful and easy to use tools to enable them to discover and use insights to make effective decisions, customers want to use personalised, high performance and convenient online services and IT requires a secure, scalable and comprehensive information platform.

Want to learn more? Join us to see how to drive real-time business, from apps to insights, through a deeper look into the comprehensive in-memory technologies in Microsoft SQL Server 2014, Power BI for Office 365, SQL Server Parallel Data Warehouse, and Windows Azure HDInsight.

REGISTER HERE

Attending this one-day event will allow you to get a running start on understanding the extensive innovations we’re delivering around data that will empower your business with the tools you need to quickly uncover business insights and make smarter business decisions.

Morning Agenda 9:00 – 12:30

9:00 – 9:45 Registration and Breakfast

9:45 – 10:45   Keynote, Quentin Clark CVP Data Platform Group

Rafal Lukawiecki – Project Botteceli
Dan Sommer – Gartner Research Director


11:15 – 12:30, Customer Case Study Sessions
Jabil – Self Service BI in Manufacturing

Afternoon Agenda 1:00 – 5:00

ODataLib 6.2 release

MSDN Blogs - Mon, 04/14/2014 - 02:01

We are happy to announce that the ODL 6.2 is released and available on nuget along with the source code on codeplex (please read the git history for the v6.2 code info and allprevious version). Detailed release notes are listed below.

Bug fixes

Fixed a bug for parsing $it in UriParser.

Improved the JSON serialization performance for unindented format.

New Features
  • Model Enhancement: ODataLib & EdmLib now support complex type inheritance. A complex type can now inherit from another complex type by specify the baseType.
  • Model Enhancement: ODataLib & EdmLib now support open complex type. This feature allows clients to add properties dynamically to instances of this type. The added properties could be a primitive type, a complex type or as complex as an open collection type.
  • Client Enhancement: OData Client now supports property level change tracking for PATCH. If you turn on this feature, the client will only include the updated property in the PATCH payload. If you are building client with massive update, you will find this feature very useful.
  • Client Enhancement: OData Client supports overriding the property name in metadata in proxy classes. e.g. you can use lower-camel naming convention in your client talking to a Server in Pascal naming convention.
  • New APIs: ODataLib support generating ServiceDocument from EdmModel directly by an new extension method GenerateServiceDocument().
Known Issues
  • Type casting for complex type in $filter and $select is not supported.
  • Reading individual property of derived complex type directly by OData Client is not supported.
Call to Action

You and your team are highly welcomed to try out this new version if you are interested in the new features and fixes above. For any feature request, issue or idea please feel free to reach out to us.

Thanks,

The OData Team

de:code セッション確定までもう少し!

MSDN Blogs - Mon, 04/14/2014 - 01:49
Build 2014 が終わってサンフランシスコから帰国後、コンテンツチームメンバーは休む間もなく de:code 全セッション確定に向けて作業しています。Build 2014 での発表内容を加味して、内容とスピーカーの調整を続けていますが、なんとか今週中を目途に多くのセッションのタイトルと概要などを公開できる見込みとなってきました。 一方で、4/11 には先行して 45 セッションのタイトルと新しいトラック名が公開になっていますが、ご覧になられたでしょうか? >> de:code セッション情報 << 主な技術系のトラックは下記の 4 つに分類しています。これらに加えて、Special トラックと Sponsor トラックの合計 6 トラックで全セッションが構成されます。 トラックというのは一種のカテゴリ名で、イベントにご参加される方々が各セッションの大枠の内容を把握していただきやすいように設けています。イベントによっては「トラック=部屋割り」という場合もありますが、今回の de:code はトラック毎のセッション割合も異なりますので、トラックと部屋割りは別物と思っていただければと思います...(read more)

Bewegen Sie sich sicher im Netz?“

MSDN Blogs - Mon, 04/14/2014 - 01:26


Am vergangenen Montag waren die Medien wieder voll davon: Datenklau im Internet. Datendiebe hatten zugeschlagen und die Passwörter der E-Mail Konten von gut drei Millionen deutschen Internetnutzern geklaut und diese möglicherweise für Spamversand und Internetbetrug genutzt. Haben Sie sich in diesem Zusammenhang schon einmal gefragt haben, wie sicher Sie eigentlich im Internet surfen und wie Sie sich gegen Internetkriminalität und Datenklau schützen können? Dann nutzen Sie jetzt das Internetportal IT Fitness. Dort können Sie mit Hilfe eines Selbsttest herausfinden welcher Internet-Nutzertyp Sie sind und welchen Kenntnisstand Sie im Thema IT-Sicherheit aufweisen. Zusätzlich bietet das Portal eine auf Ihre Testergebnisse zugeschnittene Linkliste. Diese bietet Ihnen die Möglichkeit mit praktischen Tipps und Erklärungen Wissenslücken aufzufüllen und Ihr neu gewonnenes Wissen auch praktisch anzuwenden. Mit Ihrem Angebot reagiert das Portal auf die zunehmende Verunsicherung der Deutschen im Thema Datenschutz und die gestiegene Bedrohung durch digitale Attacken auf persönliche Daten sowie das Risiko von Betrug und Diebstahl im Internet.

Nutzen Sie jetzt die Chance und erfahren Sie bei IT Fitness wie Sie sich im Internet schützen können oder besuchen Sie unsere Seite Partners in Learning und erfahren Sie dort mehr rund ums Thema „sicher surfen“.

Pages

Subscribe to Randy Riness @ SPSCC aggregator
Drupal 7 Appliance - Powered by TurnKey Linux