Developing Windows Applications with MS Visual Studio 2010

Developing Windows Applications with MS Visual Studio 2010
Event on 2014-11-03 08:30:00

Length: 5 days

In this course, experienced developers who know the basics of Windows Forms development gain more advanced Windows Client design and development skills. WinForms and WPF programming models, as well as relative strengths and when to use each technology, are covered.

Target Students
This course is intended for Technology Specialists in the area of Windows Client Development who work in a development environment that uses Microsoft Visual Studio .NET 2010 and Microsoft .NET Framework 4.0 to create rich client applications for Windows.

Course Objectives
After completing this course, students will be able to:


  • Understand how varying business requirements influence the design decisions when planning a Windows Client application.
  • Understand the new features of Visual Studio 2010 WPF
  • Design and build a UI that provides the expected end-user experience and UI functionality
  • Create a consistent and manageable user interface
  • Understand best practices when testing and learn how to debug their applications
  • Use advanced exception handling  in Windows Client application scenarios
  • Implement advanced data binding scenarios
  • Use coding techniques to improve the responsiveness of their applications
  • Implement localization, user assistance, and accessibility features within an application
  • Understand the basics of graphics in WPF
  • Customize controls and introduce students to custom controls
  • Implement application behaviors based on user actions or events by using attached properties and Expression Blend behaviors
  • Develop data visualization within their applications in a manner that enables the application user to drill down into data visually
  • Manage application state and settings throughout the application lifecycle
  • Deploy their applications using the various methods supported by Visual Studio 2010


Before attending this course, students must have:


  • An understanding of the problem-solving techniques that apply to software development, including the following principles of software development:
    • modern software development models
    • typical phases of a software development lifecycle
    • concepts of event-driven programming
    • concepts of object-oriented programming
    • creating use-case diagrams
    • designing and building a user interface
    • developing a structured application
  • A general understanding of the purpose, function, and features of following .NET Framework topics:
    • Common Language Runtime
    • .NET Framework class library
    • Common Type System
    • Component interoperation
    • Cross-Language Interoperability
    • Assemblies in the Common Language Runtime
    • Application Domains
    • Runtime hosts supported by the .NET Framework
  • Experience using Visual Studio 2008 in the following task areas:
    • Declaring and initializing typed variables using the Camel case naming convention
    • Using arithmetic, relational, and logical operators in code statements
    • Using branching statements to control code execution
    • Using looping statements to iterate through collections or repeat steps until a specified condition is met
    • Creating classes and methods to establish the basic structure of an application
    • Using methods and events to implement the programming logic of an application
    • Identifying syntax and logic errors
    • Accessing and managing data from a data source
  • Experience in object oriented design and development as follows:
    • Creating and accessing classes and class properties
    • Creating and accessing methods and overloaded methods
    • Implementing inheritance, base classes, and abstract classes
    • Declaring, raising, and handling events
    • Responding to and throwing exceptions
    • Implementing interfaces and polymorphism
    • Implementing shared and static members
    • Implementing generics
    • Creating components and class libraries
  • Experience in N-Tier application design and development as follows:
    • Managing a software development process
    • Controlling input at the user interface level in Windows Client applications
    • Debugging, tracing, and profiling .NET applications
    • Monitoring and logging .NET applications
    • Implementing basic testing best practices
    • Performing basic Data Access tasks with LINQ
      • Basics of LINQ to XML
      • Basics of LINQ to Entities
      • Basics of LINQ to SQL
      • Implementing basic security best practices in .NET Applications
        • Basics of Code Access Security
        • Basics of Role-Based Security
        • Basics of Cryptography Services
      • Implementing basic service calls
        • Basics of consuming XML Web Services
        • Basics of consuming WCF Services
      • Using .NET Configuration Files
      • Deploying .Net Framework Applications using ClickOnce and the MS Installer


Course Outline 

Module 1: Windows Client Application Design

The goal of this module is to ensure that students understand how varying business requirements influence the design decisions when planning a Windows Client application. Students will learn how design requirements, specifications, and business goals affect the choice between WPF and Windows Forms when updating (or planning a new) Windows Client application.


  • Windows Client Technologies
  • Architectural Patterns
  • Interoperability between Windows Forms and WPF

Lab : Planning Windows Client Applications

  • Identify Windows Client Technologies
  • Choosing Design Patterns
  • Lab Application Guided Walk-Through

After completing this module, students will be able to:

  • Choose appropriate Windows client technologies
  • Choose appropriate architectural patterns
  • Identify areas for migration from WinForms
  • Identify areas for interoperability between WinForms and WPF

Module 2: Introduction to Visual Studio 2010 and WPF Version 4

The goal of this module is to introduce students to the new features that Visual Studio 2010 and WPF version 4 provide


  • What’s New in Visual Studio 2010?
  • What’s New in WPF Version 4

Lab : Guided Tour of Visual Studio 2010 and XAML

  • Guided tour of Visual Studio 2010
  • Guided tour of XAML Editor

After completing this module, students will be able to:

  • Use new features in Visual Studio 2010
  • Use new features in WPF version 4

Module 3: Designing and Developing a User Interface

The goal of this module is to teach the student how to design and build a UI that provides the expected end-user experience and UI functionality, and retains that experience/functionality in various end-user environments, as well as when the application window resizes.


  • Defining Page Layout
  • Using Content Controls
  • Using Item Controls
  • Sharing Logical Resources in a Window

Lab : Building a User Interface

  • Choosing User Interface Controls
  • Laying out the User Interface
  • Creating and Using Resource Dictionaries

After completing this module, students will be able to:

  • Define page layout
  • Use content controls
  • Use item controls
  • Share resources within a window or user control

Module 4: Taking Control of the User Interface

The goal of this module is to enable students to create a consistent and manageable user interface.


  • Sharing Logical Resources in an Application
  • Creating Consistent User Interfaces by Using Styles
  • Changing the Appearance of Controls by Using Templates
  • Handling Events and Commands

Lab : Dynamically Controlling the User Interface

  • Creating Styles
  • Using Application Commands
  • Adding Routed Events
  • Creating a Custom Command
  • Migrating a Custom Command

After completing this module, students will be able to:

  • Share logical resources throughout an application
  • Create a consistent user interface by using styles
  • Change the appearance of controls by using templates
  • Handle events and commands

Module 5: Testing, Unit Testing, and Debugging

The goal of this module is to help students to develop good habits in regard to testing as well as enabling students to debug their applications. Students will also learn about advanced exception handling pertaining directly to Windows Client application scenarios


  • WPF Testing Strategies
  • Debugging XAML
  • Providing User Feedback for Unhandled Exceptions
  • Understanding Security Features

Lab : Testing and Debugging WPF Applications

  • Unit Testing Strategy
  • Unit Testing WPF Applications
  • Debugging Applications in Visual Studio 2010
  • Advanced Exception Handling

After completing this module, students will be able to:

  • Implement a WPF unit test strategy
  • Debug XAML by using the WPF Visualizer and PresentationTraceSources
  • Provide user feedback for unhandled exceptions
  • Understand security features of an application

Module 6: Simple Data Binding and Validation

The goal of this module is to teach the student how to implement simple data binding and data validation in order to manage data in a data source (CRUD). In addition to learning how to bind a value to a UI element, the student should learn best practices concerning when to use the various implementations of data binding and how to connect to a data source with LINQ.


  • Overview of Data Binding
  • Creating a Data Binding
  • Implementing Property Change Notification
  • Converting Data
  • Validating Data
  • Presenting Data at Design Time

Lab : Data Binding

  • Binding Controls
  • Implementing Value Converters
  • Validating Data
  • Implementing Property Change Notifications

After completing this module, students will be able to:

  • Explain WPF data binding concepts and terminology
  • Create a binding between a data source and a control
  • Implement property change notification
  • Convert data between the binding source and the binding target
  • Validate data entered by the user
  • Present data at design time

Module 7: Data Binding to Collections

The goal of this module is to enable the student to implement more advanced data binding scenarios, picking up where the previous module on data binding left off. The student will learn how to bind to ListView, GridView, DataGrid, and other collection classes.


  • Binding to Collections of Objects
  • Using Collection Views
  • Creating Master-Detail User Interfaces
  • Using Data Templates
  • Presenting Design Time Data Collections

Lab : Data Binding to Collections

  • Binding to Collections of Data
  • Using Collection Views
  • Creating Master-Detail User Interfaces
  • Using Data Templates

After completing this module, students will be able to:

  • Bind to a collection of objects
  • Sort, filter, and group collections by using collection views
  • Create master-detail user interfaces
  • Customize data display by using data templates
  • Present data collections at design time

Module 8: Enhancing UI Responsiveness

The goal of this module is to teach the students how coding techniques can be used to improve the responsiveness of their applications.


  • Implementing Asynchronous Processes
  • Implementing Responsive User Interfaces

Lab : Enhancing Application Performance

  • Asynchronous Programming Strategy
  • Asynchronous Programming
  • Parallelizing Tasks

After completing this module, students will be able to:

  • Implement asynchronous processes
  • Implement responsive user interfaces

Module 9: Integrating Localization and User Assistance Features

The goal of this module is to teach students how to implement localization, user assistance, and accessibility features within an application.


  • Localization and Globalization
  • Implementing User Assistance Features
  • Providing User Accessibility Features

Lab : Localizing a WPF Application

  • Preparing for Localization for the LocBAML Approach
  • Localizing Resources by Using LocBAML
  • Preparing for Localization by Using Strongly Typed Resources
  • Localizing Resources by Using Strongly Typed Resources
  • Choosing a Localization Approach

After completing this module, students will be able to:

  • Describe WPF localization and globalization features
  • Implement localized WPF applications
  • Implement user assistance features
  • Provide user accessibility features

Module 10: WPF 2D Graphics, Multimedia, and Printing

The goal of this module is to teach the students the basics of graphics in WPF. The module will also provide an overview of multimedia (audio and video).


  • Displaying 2D Graphics
  • Displaying Images
  • Adding Multimedia to WPF Applications
  • Creating and Printing Documents

Lab : Drawing 2-D Graphics

  • Identify the Appropriate Windows Client Technology
  • Creating the Data Access Layer and User Interface
  • Drawing Shapes, Painting with Brushes and Appling Effects
  • Adding Images

After completing this module, students will be able to:

  • Display 2D graphics
  • Add images in a WPF application
  • Add multimedia content to a WPF application
  • Create and print documents

Module 11: Control Customization

The goal of this module is to teach students how to customize controls and introduce students to custom controls.


  • Overview of Control Authoring
  • Creating User Controls
  • Creating Custom Controls
  • Managing Control Appearance by Using Visual States
  • Integrating WPF and Windows Forms

Lab : Building a User Control

  • Identify the Approach Control Type
  • Creating a User Control in WPF
  • Adding a WPF Control to a Windows Forms Application

After completing this module, students will be able to:

  • Explain scenarios and options for creating new controls
  • Create user controls
  • Create custom controls
  • Integrate WPF and WinForms controls

Module 12: Attached Properties and Behaviors in WPF

The goal of this module is to teach the students how to implement application behaviors based on user actions or application events by using attached properties and Expression Blend behaviors.


  • Implementing Attached Properties
  • Implementing Drag-and-Drop User Interfaces
  • Implementing Expression Blend Behaviors, Triggers and Actions

Lab : Implementing Drag-and-Drop Operations

  • Implementing Drag-and-Drop Operations
  • Implementing Expression Blend Behaviors

After completing this module, students will be able to:

  • Describe WPF attached properties
  • Implement drag and drop
  • Implement Expression Blend behaviors

Module 13: Animations in WPF

The goal of this module is to teach the student how to implement animations and to teach students how to develop data visualization within their applications in a manner that enables the application user to drill down into data visually. Students should also learn when animations should be used and why.


  • Using Animations
  • Using Triggers
  • Implementing Data Visualizations

Lab : Creating Animations

  • Creating Animations Declaratively
  • Creating Animations Dynamically
  • Creating Routed Events
  • Handling Routed Events

After completing this module, students will be able to:

  • Explain when animations are appropriate for the user interface
  • Implement animation in WPF
  • Initiate animation by using triggers
  • Present data visualizations by using WPF

Module 14: Application State, Settings, and Lifecycle

The goal of this module is to teach students how to manage application state and settings throughout the application lifecycle.


  • Creating Application Settings
  • Consuming Application Settings
  • Creating Custom Configuration Sections

Lab : Creating a Settings Dialog

  • Creating Application and User Setting by Using Visual Studio
  • Creating a Dialog Window
  • Reading and Writing Settings
  • Consuming Settings Properties

After completing this module, students will be able to:

  • Persist user and application settings
  • Consume user settings

Module 15: Configure and Deploy Windows Client Applications

The goal of this module is to teach students how to deploy their applications using the various methods supported by Visual Studio 2010.


  • Deployment Options
  • Deploying a Standalone WPF Application
  • Deploying an XBAP Application
  • Configuring Security Settings

Lab : Deploying Applications

  • Developing a Standalone Installer
  • Configuring a ClickOnce Deployment
  • Updating a ClickOnce Deployment

After completing this module, students will be able to:s

  • Explain deployment options
  • Deploy a standalone WPF application by using a Setup and Deployment project
  • Deploy a ClickOnce application
  • Configure security settings

at Discover ITT Riverchase Training Center
3 Riverchase Office Plaza
Birmingham, United States

Posted in Uncategorized. Tagged with , , , , , .

Blind street musicians, West Memphis, Arkansas, Sept. 1935.

Some cool Security Blinds images:

Blind street musicians, West Memphis, Arkansas, Sept. 1935.
Security Blinds
Image by New York Public Library
Digital ID: 1260000. Shahn, Ben — Photographer. Date depicted: September 1935

Notes: LOC negative # : 6017-M2 ; Schomburg negative # : SC-CN-82-152.

Source: Farm Security Administration Collection. / Arkansas. / Ben Shahn. (more info)

Repository: The New York Public Library. Schomburg Center for Research in Black Culture. Photographs and Prints Division.

See more information about this image and others at NYPL Digital Gallery.
Persistent URL:

Rights Info: No known copyright restrictions; may be subject to third party rights (for more information, click here)

A Bitcoin You Can Flip
Security Blinds
Image by jurvetson
My son has become fascinated with bitcoins, and so I had to get him a tangible one for Xmas (thanks Sim1!). The public key is imprinted visibly on the tamper-evident holographic film, and the private key lies underneath.

I too was fascinated by digital cash back in college, and more specifically by the asymmetric mathematical transforms underlying public-key crypto and digital blind signatures.

I remembered a technical paper I wrote, but could not find it. A desktop search revealed an essay that I completely forgot, something that I had recovered from my archives of floppy discs (while I still could).

It is an article I wrote for the school newspaper in 1994. Ironically, Microsoft Word could not open this ancient Microsoft Word file format, but the free text editors could.

What a fun time capsule, below, with some choice naivetés…

I am trying to reconstruct what I was thinking, and wondering if it makes any sense. I think I was arguing that a bulletproof framework for digital cash (and what better testing ground) could be used to secure a digital container for executable code on a rental basis. So the expression of an idea — the specific code, or runtime service — is locked in a secure container. The idea would be to prevent copying instead of punishing after the fact. Micro-currency and micro-code seem like similar exercises in regulating the single use of an issued number.

Now that the Bitcoin experiment is underway, do you know of anyone writing about it as an alternative framework for intellectual property?

IP and Digital Cash
Digital Cash and the “Intellectual Property” Oxymoron
By Steve Jurvetson

Many of us will soon be working in the information services or technology industries which are currently tangled in a bramble patch of intellectual property law. As the law struggles to find coherency and an internally-consistent logic for intellectual property (IP) protection, digital encryption technologies may provide a better solution — from the perspective of reducing litigation, exploiting the inherent benefits of an information-based business model, and preserving a free economy of ideas.
Bullet-proof digital cash technology, which is now emerging, can provide a protected “cryptographic container” for intellectual expressions, thereby preserving traditional notions of intellectual property that protect specific instantiations of an idea rather than the idea itself. For example, it seems reasonable that Intuit should be able to protect against the widespread duplication of their Quicken software (the expression of an idea), but they should not be able to patent the underlying idea of single-entry bookkeeping. There are strong economic incentives for digital cash to develop and for those techniques to be adapted for IP protection — to create a protected container or expression of an idea. The rapid march of information technology has strained the evolution of IP law, but rather than patching the law, information technology itself may provide a more coherent solution.

Information Wants To Be Free
Currently, IP law is enigmatic because it is expanding to a domain for which it was not initially intended. In developing the U.S. Constitution, Thomas Jefferson argued that ideas should freely transverse the globe, and that ideas were fundamentally different from material goods. He concluded that “Inventions then cannot, in nature, be a subject of property.” The issues surrounding IP come into sharp focus as we shift to being more of an information-based economy.
The use of e-mail and local TV footage helps disseminate information around the globe and can be a force for democracy — as seen in the TV footage from Chechen, the use of modems in Prague during the Velvet Revolution, and the e-mail and TV from Tianammen Square. Even Gorbachev used a video camera to show what was happening after he was kidnapped. What appears to be an inherent force for democracy runs into problems when it becomes the subject of property.
As higher-level programming languages become more like natural languages, it will become increasingly difficult to distinguish the idea from the code. Language precedes thought, as Jean-Louis Gassée is fond of saying, and our language is the framework for the formulation and expression of our ideas. Restricting software will increasingly be indistinguishable from restricting freedom of speech.
An economy of ideas and human attention depends on the continuous and free exchange of ideas. Because of the associative nature of memory processes, no idea is detached from others. This begs the question, is intellectual property an oxymoron?

Intellectual Property Law is a Patch
John Perry Barlow, former Grateful Dead lyricist and co-founder (with Mitch Kapor) of the Electronic Frontier Foundation, argues that “Intellectual property law cannot be patched, retrofitted or expanded to contain digitized expression… Faith in law will not be an effective strategy for high-tech companies. Law adapts by continuous increments and at a pace second only to geology. Technology advances in lunging jerks. Real-world conditions will continue to change at a blinding pace, and the law will lag further behind, more profoundly confused. This mismatch may prove impossible to overcome.”
From its origins in the Industrial Revolution where the invention of tools took on a new importance, patent and copyright law has protected the physical conveyance of an idea, and not the idea itself. The physical expression is like a container for an idea. But with the emerging information superhighway, the “container” is becoming more ethereal, and it is disappearing altogether. Whether it’s e-mail today, or the future goods of the Information Age, the “expressions” of ideas will be voltage conditions darting around the net, very much like thoughts. The fleeting copy of an image in RAM is not very different that the fleeting image on the retina.
The digitization of all forms of information — from books to songs to images to multimedia — detaches information from the physical plane where IP law has always found definition and precedent. Patents cannot be granted for abstract ideas or algorithms, yet courts have recently upheld the patentability of software as long as it is operating a physical machine or causing a physical result. Copyright law is even more of a patch. The U.S. Copyright Act of 1976 requires that works be fixed in a durable medium, and where an idea and its expression are inseparable, the merger doctrine dictates that the expression cannot be copyrighted. E-mail is not currently copyrightable because it is not a reduction to tangible form. So of course, there is a proposal to amend these copyright provisions. In recent rulings, Lotus won its case that Borland’s Quattro Pro spreadsheet copied elements of Lotus 123’s look and feel, yet Apple lost a similar case versus Microsoft and HP. As Professor Bagley points out in her new text, “It is difficult to reconcile under the total concept and feel test the results in the Apple and Lotus cases.” Given the inconsistencies and economic significance of these issues, it is no surprise that swarms of lawyers are studying to practice in the IP arena.
Back in the early days of Microsoft, Bill Gates wrote an inflammatory “Open Letter to Hobbyists” in which he alleged that “most of you steal your software … and should be kicked out of any club meeting you show up at.” He presented the economic argument that piracy prevents proper profit streams and “prevents good software from being written.” Now we have Windows.
But seriously, if we continue to believe that the value of information is based on scarcity, as it is with physical objects, we will continue to patch laws that are contrary to the nature of information, which in many cases increases in value with distribution. Small, fast moving companies (like Netscape and Id) protect their ideas by getting to the marketplace quicker than their larger competitors who base their protection on fear and litigation.
The patent office is woefully understaffed and unable to judge the nuances of software. Comptons was initially granted a patent that covered virtually all multimedia technology. When they tried to collect royalties, Microsoft pushed the Patent Office to overturn the patent. In 1992, Software Advertising Corp received a patent for “displaying and integrating commercial advertisements with computer software.” That’s like patenting the concept of a radio commercial. In 1993, a DEC engineer received a patent on just two lines of machine code commonly used in object-oriented programming. CompuServe announced this month that they plan to collect royalties on the widely used GIF file format for images.
The Patent Office has issued well over 12,000 software patents, and a programmer can unknowingly be in violation of any them. Microsoft had to pay 0MM to STAC in February 1994 for violating their patent on data compression. The penalties can be costly, but so can a patent search. Many of the software patents don’t have the words “computer,” “software,” “program,” or “algorithm” in their abstracts. “Software patents turn every decision you make while writing a program into a legal risk,” says Richard Stallman, founder of the League for Programming Freedom. “They make writing a large program like crossing a minefield. Each step has a small chance of stepping on a patent and blowing you up.” The very notion of seventeen years of patent protection in the fast moving software industry seems absurd. MS-DOS did not exist seventeen years ago.
IP law faces the additional wrinkle of jurisdictional issues. Where has an Internet crime taken place? In the country or state in which the computer server resides? Many nations do not have the same intellectual property laws as the U.S. Even within the U.S., the law can be tough to enforce; for example, a group of music publishers sued CompuServe for the digital distribution of copyrighted music. A complication is that CompuServe has no knowledge of the activity since it occurs in the flood of bits transferring between its subscribers
The tension seen in making digital copies revolves around the issue of property. But unlike the theft of material goods, copying does not deprive the owner of their possessions. With digital piracy, it is less a clear ethical issue of theft, and more an abstract notion that you are undermining the business model of an artist or software developer. The distinction between ethics and laws often revolves around their enforceability. Before copy machines, it was hard to make a book, and so it was obvious and visible if someone was copying your work. In the digital age, copying is lightning fast and difficult to detect. Given ethical ambiguity, convenience, and anonymity, it is no wonder we see a cultural shift with regard to digital ethics.

Piracy, Plagiarism and Pilfering
We copy music. We are seldom diligent with our footnotes. We wonder where we’ve seen Strat-man’s PIE and the four slices before. We forward e-mail that may contain text from a copyrighted news publication. The SCBA estimates that 51% of satellite dishes have illegal descramblers. John Perry Barlow estimates that 90% of personal hard drives have some pirated software on them.
Or as last month’s Red Herring editorial points out, “this atmosphere of electronic piracy seems to have in turn spawned a freer attitude than ever toward good old-fashioned plagiarism.” Articles from major publications and WSJ columns appear and circulate widely on the Internet. Computer Pictures magazine replicated a complete article on multimedia databases from New Media magazine, and then publicly apologized.
Music and voice samples are an increasingly common art form, from 2 Live Crew to Negativland to local bands like Voice Farm and Consolidated. Peter Gabriel embraces the shift to repositioned content; “Traditionally, the artist has been the final arbiter of his work. He delivered it and it stood on its own. In the interactive world, artists will also be the suppliers of information and collage material, which people can either accept as is, or manipulate to create their own art. It’s part of the shift from skill-based work to decision-making and editing work.”
But many traditionalists resist the change. Museums are hesitant to embrace digital art because it is impossible to distinguish the original from a copy; according to a curator at the New Museum of Contemporary Art, “The art world is scared to death of this stuff.” The Digital Audio Tape debate also illustrated the paranoia; the music industry first insisted that these DAT recorders had to purposely introduce static into the digital copies they made, and then they settled for an embedded code that limited the number of successive copies that could be made from the a master source.
For a healthier reaction, look at the phenomenally successful business models of Mosaic/Netscape and Id Software, the twisted creator of Doom. Just as McAfee built a business on shareware, Netscape and Id encourage widespread free distribution of their product. But once you want support from Netscape, or the higher levels of the Doom game, then you have to pay. For industries with strong demand-side economies of scale, such as Netscape web browsers or Safe-TCL intelligent agents, the creators have exploited the economies of information distribution. Software products are especially susceptible to increasing returns with scale, as are networking products and most of the information technology industries.
Yet, the Software Publishers Association reports that 1993 worldwide losses to piracy of business application software totaled .45 billion. They also estimated that 89% of software units in Korea were counterfeit. And China has 29 factories, some state-owned, that press 75 million pirated CDs per year, largely for export. GATT will impose the U.S. notions of intellectual property on a world that sees the issue very differently.
Clearly there are strong economic incentives to protect intellectual property, and reasonable arguments can be made for software patents and digital copyright, but the complexities of legal enforcement will be outrun and potentially obviated by the relatively rapid developments of another technology, digital cash and cryptography.

Digital Cash and the IP Lock
Digital cash is in some ways an extreme example of digital “property” — since it cannot be copied, it is possessed by one entity at a time, and it is static and non-perishable. If the techniques for protecting against pilferage and piracy work in the domain of cash, then they can be used to “protect” other properties by being embedded in them. If I wanted to copy-protect an “original” work of digital art, digital cash techniques be used as the “container” to protect intellectual property in the old style. A bullet-proof digital cash scheme would inevitably be adapted by those who stand to gain from the current system. Such as Bill Gates.
Several companies are developing technologies for electronic commerce. On January 12, several High-Tech Club members attended the Cybermania conference on electronic commerce with the CEOs of Intuit, CyberCash, Enter TV and The Lightspan Partnership. According to Scott Cook, CEO of Intuit, the motivations for digital cash are anonymity and efficient small-transaction Internet commerce. Anonymity preserves our privacy in the age of increasingly intrusive “database marketing” based on credit card purchase patterns and other personal information. Of course, it also has tax-evasion implications. For Internet commerce, cash is more efficient and easier to use than a credit card for small transactions.
“A lot of people will spend nickels on the Internet,” says Dan Lynch of CyberCash. Banks will soon exchange your current cash for cyber-tokens, or a “bag of bits” which you can spend freely on the Internet. A competitor based in the Netherlands called DigiCash has a Web page with numerous articles on electronic money and fully functional demo of their technology. You can get some free cash from them and spend it at some of their allied vendors.
Digital cash is a compelling technology. Wired magazine calls it the “killer application for electronic networks which will change the global economy.” Handling and fraud costs for the paper money system are growing as digital color copiers and ATMs proliferate. Donald Gleason, President of the Smart Card Enterprise unit of Electronic Payment Services argues that “Cash is a nightmare. It costs money handlers in the U.S. alone approximately billion a year to move the stuff… Bills and coinage will increasingly be replaced by some sort of electronic equivalent.” Even a Citibank VP, Sholom Rosen, agrees that “There are going to be winners and losers, but everybody is going to play.”
The digital cash schemes use a blind digital signature and a central repository to protect against piracy and privacy violations. On the privacy issue, the techniques used have been mathematically proven to be protected against privacy violations. The bank cannot trace how the cash is being used or who is using it. Embedded in these schemes are powerful digital cryptography techniques which have recently been spread in the commercial domain (RSA Data Security is a leader in this field and will be speaking to the High Tech Club on January 19).
To protect against piracy requires some extra work. As soon as I have a digital bill on my Mac hard drive, I will want to make a copy, and I can. (Many companies have busted their picks trying to copy protect files from hackers. It will never work.). The difference is that I can only spend the bill once. The copy is worthless. This is possible because every bill has a unique encrypted identifier. In spending the bill, my computer checks with the centralized repository which verifies that my particular bill is still unspent. Once I spend it, it cannot be spent again. As with many electronic transactions today, the safety of the system depends on the integrity of a centralized computer, or what Dan Lynch calls “the big database in the sky.”
One of the most important limitations of the digital cash techniques is that they are tethered to a transaction between at least three parties — a buyer, seller and central repository. So, to use such a scheme to protect intellectual property, would require networked computers and “live” files that have to dial up and check in with the repository to be operational. There are many compelling applications for this, including voter registration, voting tabulation, and the registration of digital artwork originals.
When I asked Dan Lynch about the use of his technology for intellectual property protection, he agreed that the bits that now represent a bill could be used for any number of things, from medical records to photographs. A digital photograph could hide a digital signature in its low-order bits, and it would be imperceptible to the user. But those bits could be used with a registry of proper image owners, and could be used to prove misappropriation or sampling of the image by others.
Technology author Steven Levy has been researching cryptography for Wired magazine, and he responded to my e-mail questions with the reply “You are on the right track in thinking that crypto can preserve IP. I know of several attempts to forward plans to do so.” Digital cash may provide a “crypto-container” to preserve traditional notions of intellectual property.
The transaction tether limits the short-term applicability of these schemes for software copy protection. They won’t work on an isolated computer. This certainly would slow its adoption for mobile computers since the wireless networking infrastructure is so nascent. But with Windows ’95 bundling network connectivity, soon most computers will be network-ready — at least for the Microsoft network. And now that Bill Gates is acquiring Intuit, instead of dollar bills, we will have Bill dollars.
The transaction tether is also a logistical headache with current slow networks, which may hinder its adoption for mass-market applications. For example, if someone forwards a copyrighted e-mail, the recipient may have to have their computer do the repository check before they could see the text of the e-mail. E-mail is slow enough today, but in the near future, these techniques of verifying IP permissions and paying appropriate royalties in digital cash could be background processes on a preemptive multitasking computer (Windows ’95 or Mac OS System 8). The digital cash schemes are consistent with other trends in software distribution and development — specifically software rental and object-oriented “applets” with nested royalty payments. They are also consistent with the document-centric vision of Open Doc and OLE.
The user of the future would start working on their stationary. When it’s clear they are doing some text entry, the word processor would be downloaded and rented for its current usage. Digital pennies would trickle back to the people who wrote or inspired the various portions of the core program. As you use other software applets, such as a spell-checker, it would be downloaded as needed. By renting applets, or potentially finer-grained software objects, the licensing royalties would be automatically tabulated and exchanged, and software piracy would require heroic efforts. Intellectual property would become precisely that — property in a market economy, under lock by its “creator,” and Bill Gates’ 1975 lament over software piracy may now be addressed 20 years later.

——–end of paper———–

On further reflection, I must have been thinking of executable code (where the runtime requires a cloud connect to authenticate) and not passive media. Verification has been a pain, but perhaps it’s seamless in a web-services future. Cloud apps and digital cash depend on it, so why not the code itself.

I don’t see it as particularly useful for still images (but it could verify the official owner of any unique bundle of pixels, in the sense that you can "own" a sufficiently large number, but not the essence of a work of art or derivative works). Frankly, I’m not sure about non-interactive content in general, like pure video playback. "Fixing" software IP alone would be a big enough accomplishment.

Security Blinds
Image by amalthya

Posted in Best Buys. Tagged with , , , , , , , .

Microsoft reveals biggest-ever change in Windows updates

Microsoft reveals biggest-ever change in Windows updates
Rather than the historical offer-everything-to-everyone updating policy — which has relied on security patches during the approximately three years between each edition of Windows — Microsoft will create three different "tracks" that customers can …
Read more on Computerworld

Shellshock-like Weakness May Affect Windows
As more people dig into the severity and depth of Bash vulnerabilities, it appears that similar Shellshock-like remote code execution is possible on Windows systems, with Windows servers in particular at risk for RCE attacks. The Security Factory, a …
Read more on Threatpost

Posted in Articles. Tagged with , , , , , .

Latest Security Windows Installation auctions

Some recent Security Windows Installation auctions on eBay:

10x Sliding Window Locks Easy Installation High Security Home Lock Thumbscrews

End Date: Thursday Mar-29-2018 15:36:48 PDT
Buy It Now for only: $6.98
Buy It Now | Add to watch list

30x Sliding Window Locks Easy Installation High Security Home Lock Thumbscrews
End Date: Sunday Apr-1-2018 21:22:57 PDT
Buy It Now for only: $14.60
Buy It Now | Add to watch list

4pc Sliding Window Locks Safety Easy Installation High Security Home Office NEW
End Date: Tuesday Mar-27-2018 15:22:05 PDT
Buy It Now for only: $4.90
Buy It Now | Add to watch list

Posted in Uncategorized. Tagged with , , , , .

The St Johns Housing Partnership Increases Opportunities for Working Families to Find Affordable Rentals in St. Johns County

St. Augustine, Florida (PRWEB) September 08, 2014

According to University of Florida Shimberg Center, there are over 3,000 families living in St. Johns County who pay more than 50% of their income for rent. Last week, two non-profit organizations in St. Augustine purchased property that will preserve affordable rental opportunities for local families and seniors.

The St Johns Housing Partnership (SJHP) purchased The Old Colony Apartments, an 8-unit apartment complex that will be added to their growing portfolio of sustainable, below-market rental property. Funding was provided by a combined partnership with the Florida Community Loan Fund and St. Johns County Housing Division. The Alpha-Omega Miracle Home purchased 4 condominium units with the help of the Florida Housing Finance Corporation.

For over 16 years, the SJHP has been an advocate and provider of energy-efficient, safe and healthy homes. The SJHP specializes in affordable housing solutions that include rental housing, emergency home repair services, energy-efficiency and accessibility retrofits and financial counseling in St. Johns and Clay Counties.

The apartments will be added to an existing SJHP portfolio of 26 single-family rental homes and a 60-unit complex for seniors. All properties are leased at below-market prices and the SJHP offer credits counseling for its tenants. Providing budget management, credit repair and financial planning along with reduced rents, creates a pathway to home ownership and financial security.

The Alpha Omega purchase will provide housing for young mothers and their children. There is a severe shortage of decent and affordable rental opportunities, especially for single parents, and the rental financing programs from the FHFC has opened the door for preserving these properties for 10-20 years.

St. Johns County is one of the wealthiest counties in Florida for both per capita income and median household income. Yet, there are 12,000 wage earners in St. Johns County earning an average income of $ 10.09/hour. Average rents for a 2 bedroom apartment requires an income of $ 17.98/hour to be affordable (30% of gross income).

A very informative study conducted by the the Florida Housing Coalition, “Home Matters” clearly states, “The health, safety and welfare of Floridians and the strength of Florida’s overall economy hinges on an adequate supply of affordable housing for Florida’s working families, elders and people with disabilities living on fixed incomes”.

Posted in News. Tagged with , , , , , , , , , , .

Cool Home Security images

A few nice Home Security images I found:

home security
Home Security
Image by Esthr
Don’t *you* have a frog prince guarding your electricity outlet? (thanks, Laurie!)

Home security checks, June 2012
Home Security
Image by USAG Vicenza
Andrea Terrell, USAG-Vicenza Directorate of Security physical security officer, checks exterior door bolts at the residence of Lt. Col. Eric Lewis in Torri di Quartesolo, Italy, June 26.

Photo by David Ruderman, USAG-Vicenza Public Affairs

Home security checks, June 2012
Home Security
Image by USAG Vicenza
Andrea Terrell (left), USAG-Vicenza Directorate of Security physical security officer, and Lt. Col. Eric Lewis of Vicenza Health Clinic check front door bolts at Lewis’ residence in Torri di Quartesolo, Italy, June 26.

Photo by David Ruderman, USAG-Vicenza Public Affairs

Posted in Uncategorized. Tagged with , , , .

Virsys12 Makes First Acquisition with Velox Consulting

Nashville, TN (PRWEB) August 25, 2014

Award-winning technology consultancy Virsys12, a Tennessee-based Cloud Alliance Partner, announced today its acquisition of Nashville-based Velox Consulting, LLC. Velox is a firm recognized for its success in implementing Salesforce cloud technologies and founder Paul Peterson will join the Virsys12 team today as director, client success.

“We are fortunate that Paul has put his trust in Virsys12 and we know it will mean great things for our clients to have his wisdom and experience on their projects,” comments Virsys12 founder and president Tammy Hawes. “Not only is he a Salesforce expert, he has a strong history in application development which is a key area of growth for us right now.”

Prior to starting his consulting practice, Paul Peterson was a senior partner at KPMG where he ran the CRM for the insurance practice, along with the healthcare payer and provider consulting practices. Throughout his career, Paul has been involved in numerous application development projects, business process improvement initiatives, and large-scale technology implementations and he even received a patent on sales automation software he created.

“After ten years of running a successful consultancy, I realized I was hungry for a new challenge. Getting in on early stage growth with an exploding firm like Virsys12 in an area of my expertise was the perfect answer,” responds Peterson.

Peterson joins just as Virsys12 is finalizing the roll out of a major app release built for the healthcare industry on the Salesforce AppExchange. So far in 2014, Virsys12 has increased staff 60% over 2013 and their client base by 50%.

An additional promotion and two staff additions are also announced this month at Virsys12. Michael Crockett moves from associate consultant to team lead and consultant. Joining the Virsys12 team as associate consultants are Heena Shah, a Salesforce certified developer and administrator who was most recently with HCA and Mike Gedelman, a recent Boston University graduate with a BA in Computer Science and experience in application development.

Peterson continues, providing more detail on how the relationship with Virsys12 began. “A mutual friend, Linda Rebrovick, introduced me to Tammy last year and we really connected over the opportunities that are exploding with the growth of’s offerings. I was so impressed with what Tammy is accomplishing with Virsys12 that when she opened the door to discuss a possible future together, I jumped at the chance. I know I can have an impact and add value and I look forward to being a part of this dynamic team.”

Financial terms of the transaction were not disclosed. More information on Virsys12’s healthcare app, and V12 Alerts, an alert management app, will be released soon.

Virsys12 is an award-winning technology consultancy and a Nashville-based Cloud Alliance Partner. The rising firm specializes in Salesforce products and is focused on healthcare. Founder and CEO Tammy Hawes along with her leadership team, bring more than 50 years of executive success achieved across a wide variety of large, small, public and private enterprises. Virsys12’s rapidly growing individually certified team maintains top customer satisfaction ratings and excels in lean business process and creative solutions. Virsys12 is the choice for any business using cloud data to improve quality, speed, security and ROI in their operations. For more information visit

Salesforce, Salesforce1 and others are among the trademarks of

Find More Security Doors Press Releases

Posted in News. Tagged with , , , , , .