July 30, 2012

Illustrated Design Patterns: More real-time examples in C#
In software engineering, a design pattern is a general repeatable solution to a commonly occurring problem in software design. A design pattern isn't a finished design that can be transformed directly into code. It is a description or template for how to solve a problem that can be used in many different situations.

Three Schools of Thought for Enterprise Architecture
Mostly the online discussion focused around the role of the newest domain of Enterprise Architecture… the domain of Business Architecture. Depending on how Business Architecture is understood, the role of EA can be dramatically different.

Setup of ThinApp Factory in vSphere
The following article was published on the vmWare Blog and outlines the steps to install the ThinApp Factory Appliance in a vSphere environment using the Setup Executable.

Homemade tech to reduce India's cyber threats
Cybersecurity analyst calls on government to promote use of local IT products to prevent cyberespionage caused by foreign-made equipment.

Chores to consider before and after upgrading to OS X Mountain Lion
A prominent Mac storage developer recently pitched its software as the path to "a smooth upgrade to Apple's Mountain Lion." Whether or not one buys the program, the recommended list of chores — both before and after the OS upgrade — make sense, especially for the new SSD-only MacBook Pros and MacBook Airs.

Is Windows 8 a catastrophe or a success?
Windows 8 is basically, in my humble opinion, Windows 7 R2 with a new interface dubbed 'Metro.' Admittedly, I wasn't a big fan of '8' in the beginning. I've changed my mind--in spite of what some fanboys think--without a penny coming to my bank account from Microsoft.

In Columbus, a hospital designed for purposeful distraction
A thoughtful design strategy that is not meant to be noticed is placing computer stations, work areas, and educational spaces away from the patient rooms. This reduces foot traffic and stressful distractions directly around patient rooms.

Fraudsters tempt Olympic fans with bogus streaming websites
"Other fake live streaming sites when clicked will redirect to another site requiring an email address," wrote Maela Angeles, a fraud analyst with Trend Micro. "As such, cybercriminals can harvest email addresses, which may be used for their spamming activities."

Apple earns a place on Chinese blacklist
Guangdong's watchdog has placed Apple on a "company integrity" blacklist due to after-care and policy concerns.

Custom Functions in Excel: Part V, XLL-RTDs
Why would you want to call an RTD from an XLL? Recall that the way to call an RTD is through the RTD function in Excel, so the user needs to somehow remember how many parameters your function takes and in what order to supply them and even what the function is called. Good luck explaining that to your users!

How to set up and use the RTD function in Excel
Just in case you wonder what is RTD and how to have it setup, here is the microsoft knowledge base article on the subject.


Quote for the day:

"Enduring setbacks while maintaining the ability to show others the way to go forward is a true test of leadership." ~Nitin Nohria