Author: IntelliTect

How I Installed Software on a Server Using PowerShell

Installation I was tasked with installing custom and generic software on a dozen new servers. As an SDET, I have never done this type of task before, so I googled some methods for automating this process since manually installing each server was time-consuming. PowerShell seemed to be the logical tool for running through my list of tasks. I was […]

JSON Serializer that Doesn’t Serialize Other Properties if Deleted is True

Search for Serialization I was recently working on a project using Azure Mobile Services (AMS) as the backend for our Android and iOS mobile apps. Using the built-in offline sync feature of AMS, you can delete records on the backend and when the mobile app synchronizes its data, the record will be deleted from the […]

Oracle Data Provider for .NET

Exploring ORM and Entity Framework in Oracle Oracle Data Provider for .NET (ODP.NET) uses Object-relational mapping (ORM) to allow developers to write object-oriented code against a Model instead of writing direct queries into the database. With Entity Framework gaining full support from Microsoft and Microsoft developers, it is critical that there exists an ORM that […]

Xamarin Forms: “BindablePicker”

Solution to Absence of BindablePicker From Xamarin Forms One of the controls missing from Xamarin Forms is a “BindablePicker” that allows you to dynamically bind an ItemsSource and SelectedItem from your view model. Fortunately, the Xamarin forums provide a solution to this problem found here: https://forums.xamarin.com/discussion/30801/xamarin-forms-bindable-picker The original implementation of this BindablePicker worked great as […]

Part 2: Writing Secure Software

Mitigating Threats to Your Software Part 2: In my last blog post, I discussed one possible process for developing secure software. We learned about potential security threats using the S.T.R.I.D.E. acronym, creating a threat model and identifying potential threats. Next, I’ll discuss prioritizing the potential threats you have identified and discuss ways to mitigate these […]

Exploring Web.config Transforms

Establishing a Secure Config Transform Setup In today’s software development process, it is recommended to have three different environments, shown below, when you are working with business critical systems. Web.config transforms help developers publish to these environments. a development environment – this is where the developers live a test environment – an exact match to […]

Logging and Tracing for NET Applications Part 2: Creating an NLog Wrapper to Azure Table Storage

.NET Applications Part 2: Welcome back to part two of our discussion on logging and tracing for .NET applications. In part one, we discussed a feature introduced in C# 5 that allows us to log detailed file, member, and line number information when tracing. Today, we’ll show how to build a wrapper for NLog that […]