This article by Satheesh Kumar N and Subashni S, the authors of Software Testing using Visual Studio 2012 discusses about the features of Visual Studio 2012. Visual Studio supports many testing features, and provides an IDE for testing and running the tests. It is very simple to run tests from Test Explorer user interface and view the results, or re-run the test from the Test Results window. Other than the IDE support, Visual Studio provides command line options to execute or run the tests that were created using the IDE. This option is very handy when executing the tests from other applications, or scheduling automated testing.
In this article, multiple command line tools are explained in detail to use for running the tests with different options and then collecting the output. Visual Studio 2012 provides three different command line utilities to execute the tests and they are as follows:
- VSTest.Console: This command line utility is for running the automated unit tests and coded UI tests from the command line.
- MSTest: This command line utility is for running the automated tests, viewing Test Results from Test Runs, and saving the results to Team Foundation Server. MSTest is also used for the compatibility with Visual Studio 2010.
- TCM: This command line utility is used for importing automated tests into Test Plan, running tests from Test Plan, and viewing lists of test items.
This article provides a complete description of various technologies, such as Visual Studio 2012, .NET 4.5, ASP.NET, Windows 8 Applications, Windows Presentation Foundation, HTML5, jQuery, memory management, and so on, and practical examples to create real-world applications. This article by Abhishek Sur, author of Visual Studio 2012 and .NET 4.5 Expert Development Cookbook, introduces the latest enhancements of ASP.NET 4.5 with HTML5 and jQuery.
Just like other technologies, ASP.NET had also come up with major alterations and advancements in recent times. Some of the things are merely related to actual development experiences rather than any benefits in terms of performance for the end user. But recent changes to ASP.NET have some real advantages and performance implication directly moving to the end users. The introduction of minification of JS and CSS files so easy now; anyone can now implement the same without using single lines of code. The code is inbuilt into the ASP.NET system and the API uses it gracefully to handle the release and debug environments.
It is not only restricted with the feature releases, but the Web has recently made a lot of advancements in terms of new HTML constructs appearing to the world. The adoption of HTML5 and CSS3 made the appearance of the Web almost identical to the desktop yet it runs on the browser. The browser is now capable of taking advantage of a graphics card or even multiple CPUs. There are APIs to directly communicate with the server from the client using a secured socket rather than the very old AJAX requests. The web look and feel has changed to support vector graphics, 2D and 3D canvas, WebGL, and so on, or even the browser supports local data storage, database, application cache, and much more. The world is moving towards a system where there will be a unified collaboration of online and offline activities.
This article focuses on some of the best introductions to the modern ASP.NET environment that catalyzes the modern web world. The article will guide you through the basic understanding of the concepts that will place you apart from other developers.Read Enhancements to ASP.NET in full
This article by Fabrizio Volpe, author of Getting Started with Microsoft Lync Server 2013, discusses about Lync 2013 mobile clients. These clients have been made available for iPhone, iPad, Windows Phone, and Android. Audio and video over IP are available with this release of the client, and this is something we have to keep in mind when we are planning our clients' deployment because the mobile version is now a viable alternative (if not a replacement) to the full Lync 2013 client.Read Choosing Lync 2013 Clients in full
In this article by Jobin Kuruvilla, the author of JIRA 5.x Development Cookbook we will learn about programming issues, that is, creating, editing, or deleting issues, creating new issue operations, managing the various other operations available on issues via JIRA APIs, and so on.Read Programming Issues in full
In this article created by Danny Varghese, the author of Microsoft Dynamics CRM 2011 Applications (MB2-868)Certification Guide you will learn about:
- Introduction to CRM 2011
- Training and certifications
Read Microsoft Dynamics CRM 2011 Overview in full
In this article by Abilash GB, the author of the book VMware vSphere 5.1 Cookbook, all the predefined Image Profiles available from an Offline Bundle that are read-only. To customize such Image Profiles, you will need to clone them to form new Image Profiles. In this article, we will learn how to create a new Image Profile by cloning an existing one.Read Creating an Image Profile by cloning an existing one in full
In this article by Mark Walker, author of Software Development on the SAP HANA Platform, we will examined the fact that some of your users might not be allowed to have access to all the data in the system, or might have specific rights, maybe to create data but not to see the data that is currently in the system. We'll see concrete example of access restrictions on both objects and their content in this article.
SAP HANA provides several different layers of security from which you can benefit, and in this article we'll be looking at each of them. We'll examine how we can create each type of object, how they interact with each other, and how we can use them.
The authorization concept in SAP HANA is comprised of different notions:
We will take a look at each of these concepts in turn.Read Authorizations in SAP HANA in full
This article will cover how DPM can protect and recover some non-Microsoft workloads. When DPM can protect a workload natively, you simply go into DPM and select the data to protect and it will back up the components needed for a successful restore. An example of a Microsoft workload that DPM can protect natively would be a virtual machine running on Hyper-V. You simply select the virtual machine for protection and DPM will protect the VHD's, the virtual machine configuration and any snapshots of that virtual machine. DPM automatically knows to protect all of the virtual machines components because DPM understands Hyper-V. This understanding comes from the workloads Volume Shadow Copy Service; this is what is considered "DPM aware".
In this article by Steve Buchanan,Islam Gomaa,Robert Hedblom and Flemming Riis, authors of Microsoft System Center Data Protection Manager 2012 SP1, we will give you valuable insight into what components need to be protected for successful backups of DPM non-aware workloads.
DPM non-aware Microsoft workload protection includes the following:
Protecting DFS with DPM
Protecting Dynamics CRM with DPM
Protecting Dynamics GP with DPM
Protecting TMG 2010 with DPM
Protecting Lync 2010 with DPM
In this article by Nicolae Tarla,author of Microsoft Dynamics CRM 2011 Scripting Cookbook, we will cover the following topics:
- Form load event usage
- Form save event usage
- Field change event usage
- Working with tabs and sections
- Combining events
- Enforcing business rules
This article created by Stefan Bauer author of Getting Started with Amazon Redshift, gets into some of the specifics and details you will need to get up and running with . As with most of the Amazon products you have used in the past, there are just a few preliminary things to take care of. You need to have signed up for the Redshift service on the Amazon account you will be using. Although these keys are not specific to Redshift, be sure to hang on to both your public and secret key strings from your user account. Those keys will be labeled Access Key and Secret Key. You can view the Access Key public portion from the user security credentials on the Security Credentials tab. However, if you do not capture the secret key when you create the keys, it cannot be recovered and you will need to generate a new key pair. You will need these when we start talking about loading data and configuring the command-line tools. Once you have the permissions for your account, the process to create the cluster is a wizard-driven process that you can launch from your Amazon Redshift management console.Read Transition to Readshift in full