Webmatrix: No files checked-in error message
Having a personal Windows Azure account all setup, I began developing a blank site for the purpose of being a “test tube” for my self taught dabblings on Razor, Twitter Bootstrap and other subjects of interest to me.
The initial setup was:
- Provisioning the Azure Web Site;
- Getting the Bootstrap starter page and its custom stylesheet;
- Adding the files to a new Project on the TFS default collection.
Afterwards, I submitted a first check-in to TFS service just for the sake of testing the whole of the development tools. I got the error: “No files were checked-in”.
After a few exploitations, I realized the Webmatrix development tool failed to create the TFS project. I had to create the project manually on the TFS Web console and afterwards it worked fine.
Still, it’s kind of a let down to find this bug on such an early stage of development.
Useless Internet stuff
This is so useless, yet you just gotta try it out:
http://www.tweakandtrick.com/2010/06/watch-hidden-star-wars-in-windows-xp.html
For the impatient non-geeks, the video:
Geeky fun: A Christmas Present for You
Link: Geeky fun: A Christmas Present for YouSeason greetings (in powershell)!
Top 5 Software Quality eBooks of 2013 (Free for Download)
Link: Top 5 Software Quality eBooks of 2013 (Free for Download)Guys at Smartbear are offering a free 5 eBook set about software testing.
Malware Response Guide
Through Microsoft’s Security newsletter, I learned about a great resource which is the Infrastructure Planning and Design (IPD) Guide for Malware Response.It helps with planning the best and most cost-effective response to malicious software for your organization. This free guide provides methodologies for the assessment of malware incidents, walks through the considerations and decisions that are pertinent to timely response and recovery, and describes approaches to investigating outbreaks and cleaning infected systems.
The Malware Response Guide includes the following content:
- Step 1: Confirm the Infection. This step involves taking actions to immediately contain an infection. Information is gathered from the user and about the system to help assess the breadth of the problem.
- Step 2: Determine the Course of Action. This step involves determining the risk to data, performing backups before proceeding with the chosen course of action, if required, and deciding whether to examine the malware’s effects on the system. Also, decide whether to clean the malware, restore system state, or rebuild the system
- Step 3: Attempt to Clean the System. This step involves putting the system cleaning plan into effect. Attempting to remove the malware using automated tools such as antimalware products are performed.
- Step 4: Attempt to Restore the System State. This step involves attempting to restore the system state, and evaluating the restored system for the effectiveness of malware removal.
- Step 5: Rebuild the System. This step involves either rebuilding the system from image or by reinstalling the operating system. Also, restoring the user settings and data are performed, and evaluating the activities performed for effectiveness.
- Step 6: Conduct Post Attack Review. This step focuses on post-attack items to consider for lessons learned.
Excelent OOP example - Generalizing storage access in ASP.NET web applications - | Gunnar Peipman - Programming Blog
Link: Excelent OOP example - Generalizing storage access in ASP.NET web applications - | Gunnar Peipman - Programming BlogThis is one of the examples from a presentation made by a guy called Gunnar Peipman about how to port existing ASP.NET applications to Windows Azure and how to build hybrid applications that work in multiple environments. It simply, yet effectively demonstrates how to use OOP to achieve abstraction on the application from the storage access details.
Carreira - Programador de Jogos Online
Link: Carreira - Programador de Jogos OnlineNão é uma oferta comum no mercado nacional e é um desafio aliciante dadas as tecnologias envolvidas. Alguém quer brilhar?
No comments :
Post a Comment