Posted by: kcdewimaya | July 16, 2016

Interview Q and A as software architect

I believe this questions and answer are still related to anyone who is looking for a job as software architect or senior developer. The questions are originally posted by Scott Hanselmann long time ago here . If you are crafty and curious enough I find it useful for you to go to next step in your career as Software Architect, despite the fact of whether my answer below is correct or not:) I also link it into some of Wikipedia to relate to what I put in my answers in green.

I skip all the behavioural question for yourself to answer.

  • What is something substantive that you’ve done to improve as a developer in your career?
    Trying different sort of technology to keep yourself updated.
  • Would you call yourself a craftsman (craftsperson) and what does that word mean to you?
  • Implement a <basic data structure> using <some language> on <paper|whiteboard|notepad>.

    You can create an easy array to show it.

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;

namespace ConsoleApplication5
    class Program
        static void Main(string[] args)
        {   string[] myColors ={“blue”,”red”,”pink”,”a”};

            int i;
            for (i=0;i<4;i++)

  • What is SOLID? Wikipedia, the free encyclopedia

It’s an acronym of five object oriented design principles which when applied together make our system an easy maintenance system.It simply helps us to avoid the bad design.
Five principles are

  1. S – SRP – Single Responsibility Principle
    Every software module should have only one reason to change
  2. O – OCP – Open closed principle
    Software modules should be closed for modifications but open for extension
  3. L – LSP – Liskov substitution principle
    Subclasses should be substitutable for base classes.
  4. I – ISP– Interface Segregation principle
    Clients should not be forced to implement interfaces they don’t use. OR Many client specific interfaces are better than one general purpose interface
  5. D – DIP– Dependency Inversion principle
    High level modules should not depend upon low level modules. Rather, both should depend upon abstraction
  • Why is the Single Responsibility Principle important?

The single responsibility principle states that every module or class should have responsibility over a single part of the functionality provided by the software, and that responsibility should be entirely encapsulated by the class.

  • What is Inversion of Control?
    In software engineering, inversion of control (IoC) is a design principle in which custom-written portions of a computer program receive the flow of control from a generic framework. A software architecture with this design inverts control as compared to traditional procedural programming: in traditional programming, the custom code that expresses the purpose of the program calls into reusable libraries to take care of generic tasks, but with inversion of control, it is the framework that calls into the custom, or task-specific, code.
    How does that relate to dependency injection? dependency injection is a software design pattern that implements inversion of control for resolving dependencies.
  • How does a 3 tier application differ from a 2 tier one?

N-tier and 3-tier are architectural deployment styles that describe the separation of    functionality into segments in much the same way as the layered style, but with each segment being a tier that can be located on a physically separate computer.
The main benefits of the N-tier/3-tier architectural style are:

  1. Maintainability. Because each tier is independent of the other tiers, updates or changes can be carried out without affecting the application as a whole.
  2. Scalability. Because tiers are based on the deployment of layers, scaling out an application is reasonably straightforward.
  3. Flexibility. Because each tier can be managed or scaled independently, flexibility is increased.
  4. Availability. Applications can exploit the modular architecture of enabling systems using easily scalable components, which increases availability.

2 client architecture is also known as client server architecture that is traditionally used that connect client to several servers. Example of 2 client architecture: client -queue-client systems.P2P applications.

The main benefits of the client/server architectural style are:

  1. Higher security. All data is stored on the server, which generally offers a greater control of security than client machines.
  2. Centralized data access. Because data is stored only on the server, access and updates to the data are far easier to administer than in other architectural styles.
  3. Ease of maintenance. Roles and responsibilities of a computing system are distributed among several servers that are known to each other through a network. This ensures that a client remains unaware and unaffected by a server repair, upgrade, or relocation.
  • Why are interfaces important?

Interfaces are important because they allow polymorphic behavior for applications. Interfaces can be passed to functions where the actual class instance isn’t known. As long as the instance that is passed to the function call inherits from the interface, the code will execute. Another great feature of using interfaces is being able to mock or stub the objects by creating “dummy” classes that have the same method signatures as the real objects, but don’t have the same implementations.

The repository pattern is a layer of abstraction between the domain model and the database. It provides domain objects in a collection that can be operated on like a list. It decouples the objects in the domain from the underlying database schema and operations.

The factory pattern is a method for encapsulating the creation of complex objects that require reusable code. For example, instead of a 5 step process for creating a dependency inside of an object, a factory method is called that returns that dependency fully configured in 1 line of code.

Patterns like these are important for software development because they reduce duplication of functionality and coupling of pieces of code. They allow requirements to be specified in a repeatable and understandable manner. And they also create code that avoids many of the pitfalls that the patterns were created to combat in the first place.

  • What are some examples of anti-patterns?

An anti-pattern is a common response to a recurring problem that is usually ineffective and risks being highly counterproductive.Spaghetti code(Programs whose structure is barely comprehensible, especially because of misuse of code structures), soft code(Storing business logic in configuration files rather than source code) ,copy and paste, lasagna code: Programs whose structure consists of too many layers
Because GoF design patterns are consider the foundation of others design pattern.

  • How do the MVP, MVC, and MVVM patterns relate? When are they appropriate?
    Used MVP for Windows Form, Use MVC for ASP.NET MVC, use MVVM in Silverlight or mobile development 
  1. Use in situations where binding via a datacontext is not possible.
  2. Windows Forms is a perfect example of this.  In order to separate the view from the model, a presenter is needed.  Since the view cannot directly bind to the presenter, information must be passed to it view an interface (IView).


  1. Use in situations where binding via a datacontext is possible.  Why?  The various IView interfaces for each view are removed which means less code to maintain.
  2. Some examples where MVVM is possible include WPF and javascript projects using Knockout.


  1. Use in situations where the connection between the view and the rest of the program is not always available (and you can’t effectively employ MVVM or MVP).
  2. This clearly describes the situation where a web API is separated from the data sent to the client browsers.  Microsoft’s ASP.NET MVC is a great tool for managing such situations and provides a very clear MVC framework.


  • Explain the concept of Separation of Concerns and it’s pros and cons.

In computer scienceseparation of concerns (SoC) is a design principle for separating a computer program into distinct sections, such that each section addresses a separate concern. A concern is a set of information that affects the code of a computer program. A concern can be as general as the details of the hardware the code is being optimized for, or as specific as the name of a class to instantiate. 

Answers from

Separation of concerns is how someone organizes code. When done correctly with methods like encapsulation, one can create code that is logically organized. Separate “concerns” or activities can be modified without affecting surrounding code. One pitfall of separating concerns lies in how well it is done. Imagine spaghetti code with 10 classes to do the job of one class. They “separate” things without reference to what goes where and why.

  • Name three primary attributes of object-oriented design. Describe what they mean and why they’re important.
  1. Encapsulation:  the hiding of data implementation by restricting access to accessors and mutators.
  2. Abstraction: template for writing classes, tightly related to encapsulation.
  3. Inheritance: By deriving classes we create what is often referred to as a class hierarchy. The class at the top of the hierarchy is known as the base class and the derived classes as subclasses. Any number of classes may be derived from a class. It is only possible for a derived class to inherit from one As such, C# is known as a single inheritance programming language.
  • Describe a pattern that is NOT the Factory Pattern? How is it used and when?

Dependency Injection(DI)

When using a factory your code is still actually responsible for creating objects. By DI you outsource that responsibility to another class or a framework, which is separate from your code.

  • You have just been put in charge of a legacy code project with maintainability problems. What kind of things would you look to improve to get the project on a stable footing?
  • Show me a portfolio of all the applications you worked on, and tell me how you contributed to design them.
  • What are some alternate ways to store data other than a relational database? In memory databases , Hadoop/NoSQL, virtualized or “federated” databases, columnar databases, streaming databases. Why would you do that, and what are the trade-offs? Expensive hardware for in memory.
  • Explain the concept of convention over configuration, and talk about an
    example of convention over configuration you have seen in the wild.

Convention over configuration (also known as coding by convention) is a software design paradigm used by software frameworks that attempt to decrease the number of decisions that a developer using the framework is required to make without necessarily losing flexibility.

Example: The phrase essentially means a developer only needs to specify unconventional aspects of the application. For example, if there is a class Sales in the model, the corresponding table in the database is called “sales” by default. It is only if one deviates from this convention, such as calling the table “product sales”, that one needs to write code regarding these names.

  • Explain the differences between stateless and stateful systems, and impacts of state on parallelism.

stateless protocol does not require the server to retain session information or status about each communications partner for the duration of multiple requests. In contrast, a protocol which requires keeping of the internal state on the server is known as a stateful protocol.

Example of stateless protocol HTTP

Example of statefull protocol FTP  between-stateless-and-stateful-systems-and-how-do-they

stateless system can be seen as a box [black? ;)] where at any point in time the value of the output(s) depends only on the value of the input(s) [after a certain processing time]

stateful system instead can be seen as a box where at any point in time the value of the output(s) depends on the value of the input(s) and of an internal state, so basicaly a stateful system is like a state machine with “memory” as the same set of input(s) value can generate different output(s) depending on the previous input(s) received by the system. 

From the parallel programming point of view, a stateless system, if properly implemented, can be executed by multiple threads/tasks at the same time without any concurrency issue [as an example think of a reentrant function] A stateful system will requires that multiple threads of execution access and update the internal state of the system in an exclusive way, hence there will be a need for a serialization [synchronization] point.

  • Discuss the differences between Mocks and Stubs/Fakes and where you might use them (answers aren’t that important here, just the discussion that would ensue).

Fake: a class that implements an interface but contains fixed data and no logic. Simply returns “good” or “bad” data depending on the implementation.

Mock: a class that implements an interface and allows the ability to dynamically set the values to return/exceptions to throw from particular methods and provides the ability to check if particular methods have been called/not called.

Stub: Like a mock class, except that it doesn’t provide the ability to verify that methods have been called/not called.

Mocks and stubs can be hand generated or generated by a mocking framework. Fake classes are generated by hand. I use mocks primarily to verify interactions between my class and dependent classes. I use stubs once I have verified the interactions and am testing alternate paths through my code. I use fake classes primarily to abstract out data dependencies or when mocks/stubs are too tedious to set up each time.

It is used in UnitTests

YAGNI a.k.a You aren’t gonna need it is a principle of extreme programming that states programmer shoul not add functionality until it is deemed necessary.

YAGNI is meant to be used in combination with several other practices, such as continuous refactoring, continuous automated unit testing, and continuous integration

  • Explain what is meant by a sandbox, why you would use one, and identify examples of sandboxes in the wild.

A sandbox is a testing environment that isolates untested code changes and outright experimentation from the production environment or repository, in the context of software development including Web development and revision control.

Optimistic Locking is a strategy where you read a record, take note of a version number (other methods to do this involve dates, timestamps or checksums/hashes) and check that the version hasn’t changed before you write the record back. When you write the record back you filter the update on the version to make sure it’s atomic. (i.e. hasn’t been updated between when you check the version and write the record to the disk) and update the version in one hit.

If the record is dirty (i.e. different version to yours) you abort the transaction and the user can re-start it.

This strategy is most applicable to high-volume systems and three-tier architectures where you do not necessarily maintain a connection to the database for your session. In this situation the client cannot actually maintain database locks as the connections are taken from a pool and you may not be using the same connection from one access to the next.

Pessimistic Locking is when you lock the record for your exclusive use until you have finished with it. It has much better integrity than optimistic locking but requires you to be careful with your application design to avoid Deadlocks. To use pessimistic locking you need either a direct connection to the database (as would typically be the case in a two tier client server application) or an externally available transaction ID that can be used independently of the connection.

  • What kinds of problems can you hit with locking model?


In concurrent computing, a deadlock occurs when two competing actions wait for the other to finish, and thus neither ever does.Deadlock is a common problem in multiprocessing systems, parallel computing, and distributed systems, where software and hardware locks are used to handle shared resources and implement process synchronization.

And a lockless model?
In multithreaded computing, the ABA problem occurs during synchronization, when a location is read twice, has the same value for both reads, and “value is the same” is used to indicate “nothing has changed”. However, another thread can execute between the two reads and change the value, do other work, then change the value back, thus fooling the first thread into thinking “nothing has changed” even though the second thread did work that violates that assumption.

    • What trade offs do you have for resource contention?

From server level, install load balancer, from code perspective do scheduling or queueing.

Task-based approach refers to a specific strategy in software engineering where, in abstract terms, you dynamically create “tasks” to be accomplished, and these tasks are picked up by a task manager that assigns the tasks to threads that can accomplish them.

Threading usual refers to the simplest form of multi-threading, which is when you have a small set of threads each doing a specific task that needs to be or could benefit from running simultaneously.

Presented with an egg, a farmer might envision a chick; a cook might envision an omelet; and a child might envision a brightly painted Easter decoration. Service orientation is an egg.

SOAs may be realized via Web services but Web services are not necessarily required to implement SOA

Fundamental to the service model is the separation between the interface and the implementation. The invoker of a service need only (and should only) understand the interface; the implementation can evolve over time, without disturbing the clients of the service.

In Microsoft they are using WCF(Windows Communication Foundation)

When is it appropriate to use?


We expose services to our customers because they shouldn’t be able to connect to the datasource directly.

We expose services to ourselves because it’s easier to spread them over different technologies using WCF.

We expose services because we have different user interfaces for the same datasource. And when we use services we save a third of the work.

It is never only because of the async actions.

  • What do you do to stay abreast of the latest technologies and tools?
  • What is the difference between “set” logic, and “procedural” logic. When would you use each one and why?
  • What Source Control systems have you worked with?

TFS(If you are up to date, try to look into Atlassian product, all the software company are currently look for people who is familiar with JIRA and CONFLUENCE.

  • What is Continuous Integration? Continuous Integration (CI) is a development practice that requires developers to integrate code into a shared repository several times a day. Each check-in is then verified by an automated build, allowing teams to detect problems early. Have you used it and why is it important?Check in and Check out in TFS.It is important when there are more than  developers working on the same project. 
  • Describe a software development life cycle that you’ve managed.
  • How do you react to people criticizing your code/documents?
  • Whose blogs or podcasts do you follow? Do you blog or podcast?
  • Tell me about some of your hobby projects that you’ve written in your off time.
  • What is the last programming book you read?
  • Describe, in as much detail as you think is relevant, as deeply as you can, what happens when I type “” into a browser and press “Go”.
  • Describe the structure and contents of a design document, or a set of design documents, for a multi-tiered web application.
  • What’s so great about <cool web technology of the day>?
  • How can you stop your DBA from making off with a list of your users’ passwords?

Using sql encryption

  • What do you do when you get stuck with a problem you can’t solve?
  • If your database was under a lot of strain, what are the first few things you might consider to speed it up?
  1. Indexing
  2. Increasing the memory.
  3. (or worse come to worse, throw the server away >P JUST KIDDING DONT BE SO SERIOUS!)


  • What is SQL injection?

SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

  • What’s the difference between unit test and integration test?

Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation.

Integration testing (sometimes called integration and testing, abbreviated I&T) is the phase in software testing in which individual software modules are combined and tested as a group. It occurs after unit testing and before validation testing.

Code refactoring is the process of restructuring existing computer code—changing the factoring—without changing its external behavior.

  1. Rename Method
  2. Split temporary variable
  3. Subtitute algorithm
  • You have two computers, and you want to get data from one to the other. How could you do it?
  • Left to your own devices, what would you create?

Bot making in Telegram, blog writing and playing pokemon bot. and maybe spying the internet >P

  • Given Time, Cost, Client satisfaction and Best Practices, how will you prioritize them for a project you are working on? Explain why.
  • What’s the difference between a web server, web farm and web garden? How would your web application need to change for each?


A web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. The term can refer to the entire system, or specifically to the software that accepts and supervises the HTTP requests.

This is the case where you have only one web server and multiple clients requesting for resources from the same server. But when are is huge amount of incoming traffic for your web sites, one standalone server is not sufficient to process the request. You may need to use multiple servers to host the application and divide the traffic among them. This is called “Web Farm”. So when you are hosting your single web site on multiple web servers over load balancer is called “Web Farm”. The below diagram shows the overall representation of Web Farms.

Web Gardens

Now, let’s have a look at what is Web Garden? Both the terms sound the same, but they are totally different from each other. Before starting with Web Garden, I hope you have a fundamental idea of what an Application Pool is and what a Worker Process is. If you have already read the article, “How IIS Processes ASP.NET Request ?”, then I can expect that you now have a good idea about both of them.

Just to recall, when we are talking about requesting processing within IIS, Worker Process (w3wp.exe) takes care of all of these. Worker Process runs the ASP.NET application in IIS. All the ASP.NET functionality inside IIS runs under the scope of worker process. Worker Process is responsible for handling all kinds of request, response, session data, cache data. Application Pool is the container of worker process. Application pool is used to separate sets of IIS worker processes and enables a better security, reliability, and availability for any web application.

Now, by default, each and every Application pool contains a single worker process. Application which contains the multiple worker process is called “Web Garden”. Below is the typical diagram for a web garden application.

In the above diagram, you can see one of the applications containing the multiple worker processes, which is now a web garden.

So, a Web application hosted on multiple servers and access based on the load on servers is called Web Farms and when a single application pool contains multiple Worker processes, it is called a web garden.

  • What value do daily builds, automated testing, and peer reviews add to a project? What disadvantages are there?
  • What elements of OO design are most prone to abuse? Inheritence. How would you mitigate that? Use composition. If a class needs functionality, use composition (perhaps injecting the functionality provider into the constructor?). If a class needs TO BE like other, then use inheritance.
  • When do you know your code is ready for production?

When its bug free, and written according to design patterns.

  • What’s YAGNI? Is this list of questions an example?

YAGNI a.k.a You aren’t gonna need it is a principle of extreme programming that states programmer shoul not add functionality until it is deemed necessary.

YAGNI is meant to be used in combination with several other practices, such as continuous refactoring, continuous automated unit testing, and continuous integration

  • Describe to me some bad code you’ve read or inherited lately.
  • What is object oriented architectural style?

Object-oriented architecture is a design paradigm based on the division of responsibilities for an application or system into individual reusable and self-sufficient objects, each containing the data and the behavior relevant to the object. An object-oriented design views a system as a series of cooperating objects, instead of a set of routines or procedural instructions. Objects are discrete, independent, and loosely coupled; they communicate through interfaces, by calling methods or accessing properties in other objects, and by sending and receiving messages. The key principles of the object-oriented architectural style are:

  1. Abstraction. This allows you to reduce a complex operation into a generalization that retains the base characteristics of the operation. For example, an abstract interface can be a well-known definition that supports data access operations using simple methods such as Get and Update. Another form of abstraction could be metadata used to provide a mapping between two formats that hold structured data.
  2. Composition. Objects can be assembled from other objects, and can choose to hide these internal objects from other classes or expose them as simple interfaces.
  3. Inheritance. Objects can inherit from other objects, and use functionality in the base object or override it to implement new behavior. Moreover, inheritance makes maintenance and updates easier, as changes to the base object are propagated automatically to the inheriting objects.
  4. Encapsulation. Objects expose functionality only through methods, properties, and events, and hide the internal details such as state and variables from other objects. This makes it easier to update or replace objects, as long as their interfaces are compatible, without affecting other objects and code.
  5. Polymorphism. This allows you to override the behavior of a base type that supports operations in your application by implementing new types that are interchangeable with the existing object.
  6. Decoupling. Objects can be decoupled from the consumer by defining an abstract interface that the object implements and the consumer can understand. This allows you to provide alternative implementations without affecting consumers of the interface.

  • What is the difference between CMMI, SCRUM, Agile methodologies?

Capability Maturity Model Integration (CMMI) is a process improvement training and appraisal program.CMMI currently addresses three areas of interest:

  1. Product and service development — CMMI for Development (CMMI-DEV),
  2. Service establishment, management, — CMMI for Services (CMMI-SVC), and
  3. Product and service acquisition — CMMI for Acquisition (CMMI-ACQ).

Scrum is a framework to implement the agile methodologies. 

Posted by: kcdewimaya | September 25, 2012

SAP BI Edge 4 and lifecycle management

I have stumbled so many questions from the internet that seems to be unanswered and at one point it stressed me on whether it is really true that BI Edge 4 does not have any tool to move content from UAT testing server to production.
and I have to stumble so much in humongous document in

I have just found the answer that Lifecycle manager 3 will only be available when we download BI Edge 4 Service Pack 04 that includes FP 03(Fixed pack 3), where we need to download it separately. Only by that download we will have Lifecycle manager service 3.

And another thing that we have to look on is that Lifecycle manager console in BI Suite 4 (the enterprise edition of SAP BI 4) by now is not in the start menu anymore, but is included inside CMC. where you have to look for CMC- Visual Difference, Promotion and Version Management.

Posted by: kcdewimaya | August 2, 2012

Today Satirical Reality

The nature of Consumer Business drawn very well by the evil bunny.

taken from



Ever seen an error of:
“The secWindowsNT security plugin is not enabled. Contact your system administrator for details. (FWB 00002)”

yes, it was so annoying and I realized
that was because I add in the Mapped NT Group and update it first and second the checkmark on “NT Authentication is enabled”

So the workaround that will make bug error gone is:
1. just click on NT Authentication is enabled first, then click Update and remember CLOSE the windows.
2. Reopen again the WindowsNT authentication window

WindowsNT authentication

WindowsNT authentication


and assure that your “NT Authentication enabled” is already checked.
Then start to add the new group that you want to add under Mapped NT Member Groups. Then click update again,
Now it suppose to work.

Posted by: kcdewimaya | October 5, 2011

Showing Authentication drop down box on InfoView BOXI 3.1

In BOXI 3.1 , by default you wouldn’t see any authentication on the InfoView login.



In order to change it, you have to go to the xml(for Java InfoView) file, or to .config(for .NET InfoView) file.

For .NET to change your InfoView go to :
1. For .NET , you have to go to C:\Program Files\Business Objects\BusinessObjects Enterprise 12.0\Web Content\InfoViewApp\InfoViewApp
For Java, you have to go to C:\Program Files\Business Objects\Tomcat55\webapps\InfoViewApp\WEB-INF\web-xml
2. For .NET, change the value in authentication visible key from false to true.

 <!-- Choose whether to let the user change the authentication type -->
    <!-- If it isn't shown the default authentication type from above will be used -->

    <add key="authentication.visible" value="true"/>

For Java, change the default param-value of authentication visibility from false to true.

<!-- Choose whether to let the user change the authentication type -->
    <!-- If it isn't shown the default authentication type from above will be used -->

3. Refresh your .NET or Java InfoView.

Since .NET is under IIS Framework and Java is under Tomcat Apache, the structure will be a bit different.
Just in case you didn’t found the .NET IIS folder(well, maybe your previous BO administrator change the default folder…) go to:

IIS manager

IIS manager

1. Start button.
2. Go to run, type in cmd, press enter.
3. Type in inetmgr, press enter. (This step opens IIS Manager).
4. In the IIS Manager, go to root area and expand the root by going through
Internet Information Services->xxxxx(name of your computer)->Web Sites-> Default Web Site->InfoViewWebApp , then right click on your
InfoViewWebApp and choose Properties. In the Virtual Directory Path, you will see local path referring to your web.config folder.

Posted by: kcdewimaya | January 19, 2011

Blackberry Desktop Software Upgrade

As I have upgraded for Office 2010, my Blackberry Desktop Software was also nagging for an upgrade while I tried to sync my Contact.
It refers me to a KB where I have to had Blackberry Desktop Software 6 or above and also 64-bit machine.

The reason that I did this backup is only one, my “a” button in my blackberry curve refuse to work with me. I need to send her for repair by today!

Off and hibernate from Blackberry messenger for a while.

Posted by: kcdewimaya | December 14, 2010

longitude and latitude in Bing Maps

This question comes up from one of my student while I was teaching Windows Phone 7 , as in Windows training kit offline it says: to find a latitude of longitude go to , the question was, how to find the longitude and latitude in Bing Maps?

Here are the steps:

  1. Go to
  2. Right click on any area as your point of interenst in the map
  3. Type in : javascript:map.GetCenter() in your address bar and press enter to get the result of Longitude and Latitude of your POI.
  4. The result will be shown in the same browser

In my personal opinion, bing maps still needs lots of improvement, and it also needs more earth photographer for sure!(you can even see that Malaysia maps doesn’t have an Aerial View yet)

Posted by: kcdewimaya | December 13, 2010

Localization in Windows Phone 7

As of today when I write this post, Windows Phone 7 still support localization in some languages that is restricted only to:

English(UK/US), French , German, Italian ,Spanish

But based on some discussion on forum, I will wait and see if they come up if Microsoft might come up with something new in January 2011, instead of the work on the whole UI and keyboard input to build the whole Chinese and Japanese writing *………the pain……*

In the previous version of BOXI R1/R2 when you do changes on InfoView(and you want to deploy it from staging server to production, take notes if you do changes towards the InfoView in the same standalone server, you don’t have to worry about *.war files), the first thing that you have to do is deploying the desktop.war file.

In BOXI 3.0/3.1 there is no more desktop.war, in exchange, you will have:


which is located in one War folder that is located under
:\Program Files\Business Objects\BusinessObjects Enterprise 12.0

Posted by: kcdewimaya | November 16, 2010

Free New ebook of Charles Petzold on Windows Phone 7 Programming

On 28 of October 2010 Microsoft Press launch a new a book on a basic programming on Windows Phone 7 written by Charles Petzold , an old fellow technical writer and programmer in Microsoft.So…..Google Bing it out and start to read about it. 🙂

Untuk semua developer di Indonesia yang rajin coding, mumpung gratis, monggo didownload di lumayan untuk knowledge programming di Windows Phone 7.

Older Posts »