This post will be purely speculation by me! Take a time travel machine back in time to early 2003. It might have even been late 2002, but I think it was 2003. I was coming up with the concepts and code that would eventually be my first kick start book, and was rendering everyth … | Continue reading
Scream testing is an interesting concept, not so much applied to finding defects, but instead to clean up your processes. In the engineering world, we have a habit of creating a lot of things, yet have a very difficult time retiring things, whether those things are projects, har … | Continue reading
KB 262161 outlines the maximum number of stylesheets and rules supported by Internet Explorer 6 to 9. A sheet may contain up to 4095 rules A sheet may @import up to 31 sheets @import nesting supports up to 4 levels deep Some folks have wondered about the math that underlies these … | Continue reading
Writing good error handling code is hard in any language, whether you have exception handling or not. When I’m thinking about what exception handling I need to implement in a given program, I first classify every exception I might catch into one of four buckets which I label fata … | Continue reading
I was reading a “Joel” post (I like Joel’s writing, but I wish that he allowed comments) entitled “The Econ 101 Management Method“, which I find myself mostly in agreement. I’d like to expand a bit in the area of metrics – specifically what I call “surrogate metrics”. Most softwa … | Continue reading
…not at least as far as the database engine is concerned, anyway. As frequently as the subject of query timeouts comes up with applications based on SQL Server, people are often surprised to learn that query timeouts are a client-side concept only. Discounting situations in whi … | Continue reading
Introduction The purpose of this post is to enlighten antivirus (AV) companies to new security considerations for correctly interfacing with Bash on Ubuntu on Windows powered by the Windows Subsystem for Linux (WSL). This post will provide a background description of WSL and its … | Continue reading
This is the third in a series of blog posts on the Windows Subsystem for Linux (WSL). For background information you may want to read the architectural overview and introduction to pico processes. Posted on behalf of Stephen Hufnagel. System calls WSL executes unmodified Linux EL … | Continue reading
Posted on behalf of Nick Judge. Overview This post discusses pico processes, the foundation of WSL. It explains how pico processes work in Windows and goes into the history of how they came to be, the abstractions we decided to implement and the various use cases beyond WSL that … | Continue reading
Hi everyone! Late last year we released dbgmodel.h to enable consuming and extending the debugger data model from non-JavaScript extensions. Those COM APIs are fairly verbose so we're publishing a C++ library to enable simplified use of the data model. You can get it through Nuge … | Continue reading
When you are the team behind something like Direct3D, you need many different graphics cards to test on. And when you’ve been doing this for as long as we have, you’ll inevitably accumulate a LOT of cards left over from years gone by. What to do with them all? One option would … | Continue reading
If the word "continuation" causes eyes to glaze over, then the word "monad" induces mental paralysis. Perhaps, this is why some have begun inventing more benign names for monads. These days, monads are the celebrities of programming language theory. They gloss the cover of blog … | Continue reading
We recently announced Bash on Ubuntu on Windows which enables native Linux ELF64 binaries to run on Windows via the Windows Subsystem for Linux (WSL). This subsystem was created by the Microsoft Windows Kernel team and has generated a lot of excitement. One of the most frequent q … | Continue reading