‚ ‚
An acronym coined for the atomic, consistent, isolated, and durable properties of a transaction.
An activation category for a serviced component application that indicates whether the application runs in or out of its client's process space (library or a server application).
A set of SQL statements that are executed immediately.
Application domains provide a secure and versatile unit of processing that the common language runtime can use to provide isolation between applications.
A call to a method that does not block the calling code while waiting for results.
Determining the identity of a user from his credentials.
Allowing a user to use specific resources based on her authenticated identity.
In remoting, a channel has the responsibility of transmitting all messages between the client and object across a process boundary. The channel has been designed to work transparently with different channel types, is compatible with OSF DCE standard RPC, and supports single and multithreaded applications.
Security based on permission requests made by running code.
A group of zero or more modules that share a common security policy.
A primary unit of administration and security for the COM+ Component Services. A COM+ application is a group of components that generally perform related functions. These components further consist of interfaces and methods .
A COM+ repository that maintains the configuration information for the components.
A collection of related public functions that provides access to a COM object. The set of interfaces on a COM object composes a contract that specifies how programs and other objects can interact with the COM object.
A set of runtime properties, which define the environment for the objects that reside within it.
An in-memory relational store that abstracts away many of the differences between database implementations .
The schema of a DataSet describes the types of data that the DataSet contains; it is the metadata for the Dataset.
The process of locating logical or runtime errors in an application. Debugging involves finding the causes of the errors and fixing them.
Security based on attributes that declare the desired permissions.
A technique that allows you to place a shared assembly in the GAC by just signing the assembly with the public key. This allows the assembly to be signed with the private key at a later stage ‚ when the development process is complete and the component or assembly is ready to be deployed. This process allows developers to work with shared assemblies as if they were strongly named, yet also secures the private key of the signature from being accessed at different stages of development.
A process by which a Windows application or component is distributed in the form of installation package files to be installed on the other computers.
An XML message that contains information for updating the information in a DataSet object or a SQL Server database.
A Microsoft standard for Web Services Discovery.
A W3C standard for representing the content of an XML document as a set of nodes arranged in a hierarchy.
A Windows service that manages transactions and transaction-related communications that are distributed across two or more resource managers on one or more systems to ensure ACID properties.
A standard for describing the information that can be contained in an HTML or XML document.
An identity column is one whose value is automatically assigned by the database server when a new row is entered.
Security based on instantiated classes.
Specifying the credentials that a process should present in place of the authenticated user's credentials.
The capability for a Microsoft Transaction Server object to be activated only as needed for executing requests from its client. Objects can be deactivated even while clients hold references to them, enabling otherwise idle server resources to be used more productively.
A unique identifier for a piece of information.
Code written in one of the .NET languages that is executed by the CLR.
Packaging and sending interface method calls across thread or process boundaries via serialization and deserialization.
A type of project that allows you to create reusable setup components that help in deploying shared components. Merge modules cannot be directly installed; instead, they need to be merged with installers of applications that use the shared component packaged as a merge module.
Metadata is data about data. For example, a DataSet schema is data that describes the structure of a DataSet.
The process of precompiling assemblies in processor-specific machine code. Native compilation can be done with the help of the Native Image Generator tool (ngen.exe).
A cache that contains precompiled assemblies.
A relationship in an XML file in which one element contains another element.
A performance optimization based on using collections of already created objects. Pooling results in more efficient resource allocation.
A relationship in an XML file that ties together two separate elements.
A SQL Server command-line tool for executing queries.
A piece of information passed to a stored procedure at runtime.
A permission in .NET controls access to a resource.
A set of one or more permissions that can be granted or denied as a unit.
The feature of the .NET Framework that allows you to call the Windows API and other DLL procedures from managed code.
An interface-specific object that packages parameters for that interface in preparation for a remote method call. A proxy runs in the address space of the sender and communicates with a corresponding stub in the receiver's address space.
A COM+ service that provides an easy way to invoke and execute components asynchronously. Message processing can occur without regard to the availability of either the sender or the receiver.
A proxy that allows .NET code to make use of COM classes and members .
The .NET remoting system is an architecture designed to simplify communication between objects living in different application domains, whether or not on the same computer.
Security based on the identity of the current user.
The environment in which CLR is started and managed is known as the runtime host. When you install the .NET Framework, you get three runtime hosts already configured ‚ the Windows shell, ASP.NET, and Internet Explorer. The Runtime hosts create application domains, which run the managed code on behalf of the user.
A part of the Windows operating system that manages Windows services. SCM also manages the Windows service database (which is stored in the Windows Registry) and provides a mechanism through which other programs can interact with the Windows service database and the Windows service in execution.
An XML schema description of a piece of information, together with restrictions on the content of that information.
The process of converting one or more objects to their XML representation.
A standard for transmitting objects as XML over HTTP.
A class that is invoked during the serialization or deserialization of SOAP messages.
A SOAP message sent from client to server to invoke a Web method.
A SOAP message sent from server to client with the results of a Web method.
The official ANSI specification for Structured Query Language.
A SQL Server graphical tool for executing queries.
A set of SQL statements stored on the server for later execution.
A DataSet based on an XML Schema file, which enables table and column names to be used with an early-bound syntax.
A synchronous function call does not allow further instructions in the calling process to be executed until the function returns.
The process of executing programs and determining whether they worked as expected. Testing is the process of revealing errors by executing programs with various test cases and test data.
The process of displaying informative messages in an application at the time of execution. Tracing messages can be helpful for checking the health of a program or finding errors even though the program is already in production.
Also called T-SQL, the SQL-92 dialect used in Microsoft SQL Server.
A unit of work that is done as an atomic operation ‚ that is, the operation succeeds or fails as a whole.
A standard for discovering details of Web services and other business services available via the Internet.
Code written in a non-.NET environment that does not benefit from the services of the CLR.
An XML document is valid if it conforms to the schema in a DTD or XSD file.
The standards body that maintains the standards for such protocols as HTML and XML.
A method of a Web service that can be invoked by client applications.
Information in a Visual Studio .NET project that allows you to use objects that are supplied by a Web service.
A Web service allows you to instantiate and invoke methods on objects over the Internet.
An XML document is well-formed if it conforms to the syntactic rules for XML.
A long-running process that runs in the background usually without any user interaction. A Windows service must conform to the interface provided by the Windows Service Control Manager.
An XML language that describes the interface of a Web service.
A language for retrieving sets of nodes from an XML document.
A piece of information describing an XML element.
An XML tag together with its contents.
The structure of the actual XML messages passed between Web services servers and clients.
‚ ‚ |
Top |