Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Windows Identity Foundation (Dev - Pro)

Buy

A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with lively banter and more than a few questions about the product—all of this in front of the cameras at the MSDN studios.

We had each selected a person from the field to play for; someone whom we each thought had made a significant contribution to the success of WSE but hadn’t been a direct member of the product team itself. If we won, then our nominee would get a prize, a token of our appreciation for the work that he or she had done. My selection was a guy called Vittorio Bertocci who was working for Microsoft in Italy at the time. I’d never met Vittorio, nor even seen a photo of him, but he was a prolific poster on our internal discussion list, clearly understood the key security concepts for the product including the WS-* protocols, and had even crafted an extension to enable Reliable Messaging despite some of the crude extensibility we had in place at the time. Vittorio was someone worth playing for but, unfortunately, I didn’t win.
Time passed, the Windows Communication Foundation (WCF) superseded WSE, and I moved to become the Architect for the Identity and Access team tasked with building a Security Token Service for Windows Server. One day, out of the blue, I got an e-mail from Vittorio to say that he’d moved to Redmond to take on a Platform Evangelist role and asking if we could meet up. Of course I said yes, but what I couldn’t have anticipated was that mane of jet-black hair....

Vittorio was deeply interested in the work that we were doing to enable a claims-based programming model for .NET, on top of which we planned to build the second version of our security token service. Over time, these ideas became the “Geneva” wave of products and were finally birthed as the Windows Identity Foundation and Active Directory Federation Services 2.0.

(HTML tags aren't allowed.)

Artificial Life and Virtual Reality
Artificial Life and Virtual Reality
Artificial life refers to all the methods that try to recreate living organisms and creatures by computers. Virtual reality is the immersion of human beings in virtual worlds. This landmark book demonstrates artificial life in virtual reality. It introduces new concepts such as artificial consciousness, presence, autonomy and perception. Includes...
jQuery 2 Recipes: A Problem-Solution Approach
jQuery 2 Recipes: A Problem-Solution Approach

jQuery is often referred to as the 'write less, do more' JavaScript library. It allows a few clear lines of elegant, well-tested, code to replace many pages of complex hand-coded script, speeding development times and providing substantial cost savings. You will find jQuery 2 Recipes' problem-solution approach to be an excellent...

C# Database Basics
C# Database Basics
Using databases in C# can be daunting for developers moving from VB6, VBA, or Access. From the differences in the .NET syntax to the curly braces and semicolons, just looking at the code in C# for the first time can be intimidating. As you start to use C#, the small changes you need to make become easier and the code starts to flow...

Investing Online for Dummies, 5th Edition
Investing Online for Dummies, 5th Edition
Get up to speed with new strategies, tools, and resources

Gain control of your investments and pay less in fees and commissions — here's how

Whether you've invested online before or you're planning to start, this plain-English guide will steer you around the jargon and past the pitfalls. Uncover the best investing resources...

Lymphoma (Methods in Molecular Medicine)
Lymphoma (Methods in Molecular Medicine)

A cutting-edge collection of readily reproducible molecular techniques to better understand, classify, and treat lymphoma. Among the highlights are methods to use immunoglobulin gene rearrangements as markers of clonality, to exploit patterns of somatic mutation in the variable regions to indicate at which stage transformation occurred, and...

Topology Control in Wireless Sensor Networks: with a companion simulation tool for teaching and research
Topology Control in Wireless Sensor Networks: with a companion simulation tool for teaching and research
The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life applications. It is common to see how this technology is being applied in irrigation systems, intelligent buildings, bridges, security mechanisms,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy