Moustafa Refaat
Login   Search
Skip Navigation Links
Home
Publications
Service Offerings
Downloads and Samples
My Resume
Endorsements
Contact Me
Books
Technical Articles
Software Packages
Scroll up
Scroll down
BizTalk The Practical Course
Mastering The BizTalk Technical Interview
Soduku:Challenging Puzzels
Scroll up
Scroll down
Design Patterns Review
Software Architecture Basics Review
Simplified BizTalk Content Based Routing for a Pass_Throu data
An Extensible Light Xml Rules Engine Component
Secure Messaging Solution
Create a SQL Database Programmatically
BizTalk Unzip Adapter
Implementing Singleton pattern with BizTalk Orchestrations
Developing BizTalk Custom Adapters
BizTalk ESB Toolkit Experience Series
Scroll up
Scroll down
Setting the ESB Toolkit on the 64 Bit Machines
How The ESB Works
Sample Custom Resolver
Scroll up
Scroll down
Recent Training
Scroll up
Scroll down

News List

  • iBTSInterview (BizTalk Technical Interview) is available on iPhone and iPad
  • Toronto Code Camp Presentation is uploaded
  • BizTalk: The Practical Course is recommended by Micorsoft
  • Canadian Gigs Network (www.CanadianGigs.Net) a job web site focusing on Canadian Jobs
  • BizTalk Technical Interview Preparation
  • GT-DataSafe© Online Backup for Amazon Storage Services 3.0 is released
  • Soduku Challenging Puzzles
  • BizTalk: The Practical Course
  • Mastering The BizTalk Technical Interview is Published Now Avaliable on iPhone an iPad

Technical Articles

  • ArchiMate 3.0 Simplified
  • http://moustafarefaat.blogspot.ca/2016/11/installing-hadoop-273-on-macos-sierra.html
  • BizTalk: Implementing Web Pages with a BizTalk Endpoint
  • BizTalk: Process HTTP Post Information
  • BizTalk: ESB Itinerary as a Template
Skip Navigation Links
> Blog entries about: Deployment
Create a SQL Database Programmatically

In this article I will explain how to use MS SQL Management Objects (SMO) to create a MS SQL database from C# code. In this sample will

  1. Enumerate all the SQL servers in the network and fill a list box where the user can select one of the servers.
  2. The user will enter the Database Name to create.
  3. The user will enter an AD account to grant right to.
  4. When the user click "Create Database" the system will check for the existence of the database.

Read More..

{10/01/2009 1:34 PM} {1 comments}  {Tags: Architecture, Deployment, Exception Management, SQL Server}
Secure Messaging Solution
 
We are sending end receiving sensitive information over the internet. We want to secure all the messages we are exchanging with our partners.  Read More..
{09/06/2007 11:09 AM} {0 comments}  {Tags: BizTalk, Deployment, Security}
Designing for Secure Deployment of Web Application
I have seen so many cases where an application launch was delayed because there were problems with deploying into the production environment. They generally are all the same story in that it wouldn’t work because the network was set up with some security rules that the application didn’t support or wasn’t designed with that in mind.

 A very common network setup for security is creating a perimeter network or DMZ that “outsiders” can access, but the DMZ is separated by a firewall from the secure internal network. Additionally there might be another firewall inside the secure network separating the database servers.

Because the infrastructure is split into multiple zones, you have to have the same splits in your application architecture to make it possible to deploy on the infrastructure. This also has the related issues of communications across the zones, passing identities, etc. So in more details you have to:

  • Design the architecture to include a cleanly separated business API to ensure there is a distinct business tier.
  • Split the business tier into two parts, creating an “interface” tier and an “implementation” tier.
  • The interface tier is responsible for handling boundary activities such as validation and authentication, while the implementation tier holds the main business logic. This boundary verification logic enhances the security before passing the request to the secure network, beyond what could be done using a firewall alone.
  • The service interface tier gets deployed into the DMZ, and the implementation tier into the secure network.
  • Just one last note, does not that look like the Façade Pattern? Well close, but not the same. Hope this helps you with your system challenges.
{09/01/2006 5:44 AM} {0 comments}  {Tags: Architecture, Deployment, Web Developmenet}

Copyright © Moustafa Refaat 2016. All Rights Reserved.