Skip to content

TechRepublic

Trending Now

Businessman holds the model of business, made from wood blocks. Alternative risk concept, business plan and business strategy. Insurance concept.
Image: Michail Petrov/Adobe Stock
Article

Managing the element of risk in projects

Ransomware infects a computer's system.
Credit: Adobe
Article

How traditional security tools fail to protect companies against ransomware

featuremicrosoft461682196.jpg

Image: Microsoft News

Article

Tech News You May Have Missed: June 23-30

project team collaboration.jpg
Article

Collaborating across IT operations for a stronger enterprise environment

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of author - kevin koch

author - kevin koch

Send author - kevin koch an email

Latest from author - kevin koch

  • Web services B2B implementation demonstration: Retrospection and reflection
    Project Management

    Web services B2B implementation demonstration: Retrospection and reflection

    In the ninth article of a continuing series, Kevin Koch presents a walkthrough of the entire application, including application flow and transaction threads. He discusses possible enhancements and reiterates the main design points and principles.

    author - kevin koch
    Published:  December 15, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Project Management
  • Web services B2B implementation demonstration: Deployment process
    CXO

    Web services B2B implementation demonstration: Deployment process

    In the eighth article of a continuing series, Kevin Koch implements the debug and release configurations for the Web service applications, creates a deployment script, and explains the principles behind the staging and production configurations.

    author - kevin koch
    Published:  December 3, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more CXO
  • Web services B2B implementation demonstration: Tom’s ASPX GUI layer
    Project Management

    Web services B2B implementation demonstration: Tom’s ASPX GUI layer

    In the seventh article of this series, Kevin Koch implements the ASPX GUI layer associated with Tom's application. The GUI layer ties all of the previously established application tiers together. It will also require a simple shopping cart interface.

    author - kevin koch
    Published:  November 19, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Project Management
  • Web services B2B implementation demonstration: John’s ASPX GUI layer
    Project Management

    Web services B2B implementation demonstration: John’s ASPX GUI layer

    In the sixth article of a continuing series, Kevin Koch implements the ASPX GUI layer associated with John's application. The GUI layer ties all of the previously established application tiers together.

    author - kevin koch
    Published:  November 5, 2003, 12:00 AM PST Modified:  June 8, 2007, 9:48 AM PDT Read More See more Project Management
  • Web services B2B implementation demonstration: Tom’s app
    Project Management

    Web services B2B implementation demonstration: Tom’s app

    In the fifth article of our continuing Web services series, Kevin Koch implements the business logic and Web services associated with Tom's business tier, including the implementation of security protocols and asynchronous notification.

    author - kevin koch
    Published:  October 22, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:48 AM PDT Read More See more Project Management
  • Web services B2B implementation demonstration: John’s business logic
    Data Management

    Web services B2B implementation demonstration: John’s business logic

    In the fourth article of our continuing series on Web services B2B implementation, Kevin Koch implements the business logic and Web services associated with John's business tier, including the implementation of security protocols.

    author - kevin koch
    Published:  October 8, 2003, 6:09 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Data Management
  • Web services B2B implementation demonstration: Database design
    Data Management

    Web services B2B implementation demonstration: Database design

    In the third article of this series, Kevin Koch implements the necessary schema and scripts for SQL Server 2000, and the appropriate data tier classes for database connectivity and stored procedure invocations.

    author - kevin koch
    Published:  September 17, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:47 AM PDT Read More See more Data Management
  • Web services B2B implementation demonstration: Components, exception handling, and logging
    Developer

    Web services B2B implementation demonstration: Components, exception handling, and logging

    Kevin Koch implements the requirements established in his series' first article around an n-tier framework by creating the application components and developing exception handling and logging capabilities.

    author - kevin koch
    Published:  September 3, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more Developer
  • Web services B2B implementation demonstration: Setting the scenario
    E-Commerce

    Web services B2B implementation demonstration: Setting the scenario

    In the first part of this series, we set the scenario for the development of a complete B2B Web services application. Learn how to implement use cases to relate user requirements to developers.

    author - kevin koch
    Published:  August 20, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:46 AM PDT Read More See more E-Commerce
  • Practical examples for establishing Web service security in .NET
    Enterprise Software

    Practical examples for establishing Web service security in .NET

    Learn how to secure a Web service using Visual Studio .NET to implement a custom, stateful SOAP Header. Use the sample code to remove public access to the Web service, preventing unauthorized users from implementing your Web service.

    author - kevin koch
    Published:  May 5, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:42 AM PDT Read More See more Enterprise Software

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice