Click here to Skip to main content

Reviews on Third Party Products and Tools

This section is for reviews on third party products. This section is for the members only and must not be used to promote or advertise products in any way, shape or form.

The rules for posting articles here are simple:

  1. No paid reviews
  2. You must provide an unbiased review of a product or service.
  3. You must not post advertisements for the product, implicit or explicit. Basic information on pricing is permitted.
  4. We reserve the right to replace any links to the product with search-engine unfriendly links. Articles must not be used to promote a product in any form, including SEO.
  5. Articles must be tagged "third-party"
  6. Articles must not be written by anyone associated with the company that writes the product. Self promotion is not allowed.

Great Reads

by Chris Maunder
Testing Multiple browsers on Multiple Platforms on Multiple Devices. In the same Window.
by James Newton-King
In this post I will look at DevExtreme, a cross-platform HTML JS framework for Visual Studio, and in particular DevExtreme’s rich JavaScript charting widgets.
by Bruno Terkaly
This post will cover the whole spectrum of downloading data from a government site, loading it into an on premise SQL Server database, migrating this on premise SQL Server database to SQL database in Windows Azure.
by Felice Pollano
A list of tools and libraries I consider necessary to carry on my USB key in order to be operative everywhere in a very little time

Latest Articles

by Keyhole Software
The state of web application cryptography has changed, and each development language provides its own way of working with it. I will touch on the current state of random number generation and the differences found with it within the Java and JavaScript development languages. When designing and build
by CdnSecurityEngineer
Your foundation is laid and you know what you’ve got an idea of what you’re going to do, and what you want out of your security program, you’ve got well defined founding principals (your pillars) Now that you know that…Read more ›The post Application Security Charter ap
by Max R McCarty
This is the second article in an on going series on Microsoft Azure features and services.  If your just joining us, you might want to take a look at the previous Microsoft Azure Blob Storage article that covers how to get started with an Azure Storage account, development tools, using the Azure Sto
by CdnSecurityEngineer
Building An Application Security Program: Business Agreement Starting An Application Security Program Getting Business to agree to start an application security program is one of the hardest obstacles you will face In light of the ever ending stream of large…Read more ›The post Applicati


by cspitzer on technical blog "Building a Technology Career"
by BMEP on technical blog "Be Sure With Azure .NET –...
by tgrt on article "Crypto Obfuscator Evaluation"
by orkoder on article "Crypto Obfuscator Evaluation"
by thewazz on technical blog "SignalR is Magic"

All Articles