A1²The bundle of Microsoft antivirus and antispyware development lines.

Abstract IL (ILX)²A toolkit for accessing the contents of .NET Common IL binaries. Among its features, it lets you transform the binaries into structured abstract syntax trees that can be manipulated. Access modifiers²Language keywords used to specify the visibility of the methods and member variables declared within a class. The five access modifiers in the C# language are public, private, protected, internal, and protected internal.

Acrylic² Codename for an innovative illustration, painting and graphics tool that provides creative capabilities for designers working in print, web, video, and interactive media. Active Server Pages (ASP)²A Microsoft technology for creating server-side, Web-based application services. ASP applications are typically written using a scripting language, such as JScipt, VBScript, or PerlScript. ASP first appeared as part of Internet Information Server 2.0 and was code-named Denali.

ADO (ActiveX Data Objects)²A set of COM components used to access data objects through an OLEDB provider. ADO is commonly used to manipulate data in databases, such as Microsoft SQL Server 2000, Oracle, and Microsoft Access. ADO.NET (ActiveX Data Objects for .NET)²The set of .NET classes and data providers used to manipulate databases, such as Microsoft SQL Server 2000. ADO.NET was formerly known as ADO+. ADO.NET can be used by any .NET language. Aero²The code name for the user experience provided by Microsoft's Longhorn Operating System.

API (Application Program Interface)²A set of programs, code libraries, or interfaces used by developers to interact with a hardware device, network, operating system, software library, or application. Calls to the methods of an API are typically synchronous, but may also be asynchronous through the use of callback methods.

Application assembly cache²See Local assembly cache.

Application base²The directory where a .NET application's assembly files are stored. Also called the application folder or application directory.

Application Center 2000²A deployment and management package for Web sites, Web services, and COM components. Application Center is a key B2B and B2C component of the .NET Enterprise Server product family. Application domain²The logical and physical boundary created around every .NET application by the CLR. The CLR can allow multiple .NET applications to be run in a single process by loading them into separate application domains. The CLR isolates each application domain from all other application domains and prevents the configuration, security, or stability of a running .NET applications from affecting other applications. Objects can only be moved between application domains by the use of remoting. Application Manifest²The part of an application that provides information to describe the components that the application uses. Array²A collection of objects of the same type, all of which are referenced by a single identifier and an indexer. In the .NET Framework, all arrays inherits from the Array class that is located in the System namespace. AsmL²An Abstract State Machine Language.

ASP.NET (Active Server Pages for .NET)²A set of .NET classes used to create Web-based, client-side (Web Form) and server-side (Web Service) applications. ASP.NET was derived from the Microsoft Active Server Pages (ASP) Web technology and adapted for use in the .NET Framework. Also called managed ASP and formerly known as ASP+.

Assembly²All of the files that comprise a .NET application, including the resource, security management, versioning, sharing, deployment information, and the actual MSIL code executed by the CLR. An assembly may appear as a single DLL or EXE file, or as multiple files, and is roughly the equivalent of a COM module. See assembly manifest, private assembly, shared assembly.

Assembly Binding Log Viewer²A .NET programming tool (Fuslogvw.exe) used to view and manipulate the log of binding information that is updated at run-time when an assembly is loaded by the CLR. This log viewer is primarily used to discover why an assembly (or satellite assembly) can't be located at runtime, and to verify that the correct assemblies are being loaded by a .NET application. Assembly cache²A reserved area of memory used to store the assemblies of a .NET applications running on a specific machine. See Global Assembly Cache, Local assembly cache, Download Cache.

Assembly Cache Viewer²A .NET programming tool (Shfusion.dll) used to view, add, remove and configure information in the Global Assembly Cache using Windows Explorer. This viewer is used by clicking on the %WINDIR\Assembly folder in Windows Explorer. See Global Assembly Cache Utility.

Assembly Dependency List²A .NET programming tool (ADepends.exe) used to display all of the assemblies that a specific assembly is dependent upon. Assembly informational version²A custom attribute that attaches version information to an assembly in addition to the assembly's version number. The informational version is a string that typically contains marketing information, such as the product's name and release number (e.g., "Windows 2000 Server" or "FantastiWidget 3.0"). Assembly Linking Utility²A .NET programming tool (al.exe) used to create an assembly manifest from the specified MSIL modules or resource files. Also call the Assembly Linker and Assembly Generation Utility.

Assembly manifest²A detailed description of the contents of an assembly. A manifest contains metadata describing the name, version, types, and resources in the assembly, and the dependencies upon other assemblies. The manifest allows an assembly to be self-describing, easily deployed, and not bound to a particular system by storing information in the Windows registry. Assembly metadata²The metadata stored in assembly files.

Assembly Registration Tool²A .NET programming tool (RegAsm.exe) used to register an assembly in the Windows registry. Registration is required if COM clients need to call managed methods residing in a .NET assembly. This tool can also be used to generate a registry (.reg) file containing the necessary registration information. Registration typically only occurs once when the assembly is installed. Assembly version number²Part of an assembly's identity, and used to indicate the version, revision, and build of an assembly. The version is expressed in dot notation using four, 32-bit integers in the format "<major version>.<minor version>.<build number>.<revision>". The version number is stored in the assembly manifest and only refers to the contents of a single assembly Two assemblies that have version numbers which differ in any way are considered by the CLR to be completely different assemblies. See Assembly informational version.

"Atlanta"²The code-name of an antivirus product being developed by Microsoft. (Named after the home town of one of the product's developers).

Included in this suite are Windows 2000 Server. customer) entities. The exchange of information between business and consumer (i. Internet Security and Acceleration Server 2000. message-passing programs. See Derived Class. Host Integration Server 2000. The exchange of information between business entities. Exchange Server 2000. Custom attributes add metadata to give classes extra information that extend the definition a types' behavior. See Custom Attributes. members. Inheritance. Attribute-based programming²A programming model that allows flexibility in the behavior of a program not possible in traditional API call-based programming. and can be reconfigured at runtime by users and other programs without the need for code changes or recompilation.g. assemblies. B2C²Business-to-Consumer.0. modules... return values. . A class that is used to create (or derive) another class is called the base class or super class. metadata) to code elements (e. Attributes²Language constructs that are used by programmers to add additional information (i. and message-understood properties in behavior properties of asynchronous. The attribute's values are determined by programmers at design time. which is the graphical subsystem (User Interface framework) of Longhorn. types. Base class²The parent class of a derived class. and Systems Management Server 2. Classes may be used to create other classes. See Reflection. Behave!²A project for building tools to checking things such as deadlock freedom. Avalon²The code name for Windows Presentation Foundation (WPF).e."Asta"²A project investigating algorithms for detecting cloned code. B B2B²Business-to-Business. It is worth noting that this will be a vector-based system.. and parameters) to extend their functionality. These server applications are now referred to as the . SQL Server 2000. BackOffice Server 2000²A suite of Microsoft servers applications used for B2B and B2C services.NET Enterprise Server product family.e. invariant checking.

The methods. Scot Wiltamuth. Value types are stored in stack memory and must be converted (i. and management of different applications and data within and between business organizations.e. An asynchronous method call returns prior to the results. methods are called in a synchronous fashion. automation. C# is defined by the standard ECMA-334. Built-in Types²See Pre-defined types. Typically. The callback method itself contains program statements that are executed in response to the reception of the results... Boxing is implicitly performed by the CLR at runtime. functions. This is a combination of research projects that were formally known as polymorphic C# and Xen (and X#). Casting²Conversion of a value from one type to another. Callback Method²A method used to return the results of an asynchronous processing call.NET Enterprise Server product family. Implicit casting is performed silently by the compiler when the casting would not cause any information to be lost (e.Object). BizTalk Server is a key B2B component of the . C# was created by Anders Hejlsberg (author of Turbo Pascal and architect of Delphi). See Unboxing. the output or return value) of the call are available. C# (pronounced "see-sharp") was created specifically for building enterprisescale applications using the .g. C C (C-Omega)²An experimental programming language ² actually an extension to C# ² that focuses on distributed asynchronous concurrency and XML manipulation.e. C# (C-Sharp)²An object-oriented and type-safe programming language supported by Microsoft for use with the . converting a 16-bit integer to . Burton²The codename for Microsoft Visual Studio 2005 Team System.e. System.g.BizTalk Server 2000²A set of Microsoft Server applications that allow the integration. where the call does not return until the results (i. and then sometime later a callback method is called to return the actual results.NET Framework. and Peter Golde. Also referred to as a callback function under the Win32 API. See Event.NET Framework.. converting an integer to a string).. Boxing²Conversion of a value type to a reference type object (i. and events of the new object are invoked to perform operations on the value (e. It is similar in syntax to both C++ and Java and is considered by Microsoft as the natural evolution of the C and C++ languages. boxed) to a new object in heap memory before they can be manipulated as objects.

Class²In . Collectively. classes are templates used for defining new types. . In the 3-tier model. and properties. and are defined by the public methods (also called member functions) and events of the class.NET programming tool (DbgClr. Classes themselves are not objects. constructors.. Classes describe both the properties and behaviors of objects. Class members²The elements of a class which define it behaviors and properties.g. See Distributed architecture. the public properties and methods of a class are known as the object interface. Explicit casting is coded by the programmer using the particular language's cast operator.a 32-bit integer value). See Client/Server architecture.NET languages. See try/catch block. source-level debugging utility for MSIL applications.e. Examples include client-side scripting. Behaviors are the functionality of the object. See Runtime Debugger. CLR Debugger²A . This includes the ability to download files to be installed. member variables. Class members include events. client-side validation. This is necessary when the use of a value would cause a possible loss of data (e. but instead they are used to instantiate (i. side-by-side installation. create) objects in memory. the client contain the user interface and business logic. Catching²To trap a program exception. In the 2-tier client/server model. and client-side events. ClickOnce²A deployment technology introduced with the release of Whidbey that allows client program to be used and installed as seamless as Web applications. See structure. See Server-side. and more. Also called type members. methods. converting a 32-bit integer to a 16-bit integer value).exe) used as a Windows-based.. Properties contain the data that are exposed by the class. Client/Server architecture²An application architecture in which the server dispenses (or serves) information that is requested by one or more client applications. Client-side²An operation or event that occurs on a client system. The number of users that can be supported by a client/server system is based on the bandwidth and load of the network and processing power of the server. and the server contains the database engine and information storage. versioning. the business logic is located on a middle-tier server to reduce the processing load on the database server and to make system maintenance easier. Client²Any application that requests information or services from a server.

0.0²This was one of the pre-release names for the original Microsoft . This tool is used to examine runtime problems by taking a snapshot of the CLR as the problems occurs.NET Framework. COM+ also supports the use of many new services. Watson utility (Drwatson. a core dump) of the CLR at runtime. Collection²A class used to logically organize a group of identical types using a single identifier. See COM+. The . Commerce Server 2000²Microsoft's e-commerce server application package for developing and maintaining business Web sites. Commerce Server is a key component to creating B2C solutions using the . .NET object. have built-in interprocess communications capability. and COM+ in application design will eventually be entirely replaced by the Microsoft .NET programming tool (Mscordmp. transactional. and component-based applications using a multi-tiered architecture. and stack. Examples of collection types in the . object pooling.NET Framework. and easily fit into an Object-Oriented program design. such as Just-in-Time Activation.exe). COM was first released in 1993 with OLE2.e.NET Framework include array. The use of COM.. See Runtime Callable Wrapper (RCW). This is the core security model for new features of the Longhorn Operating System. COM objects are more versatile that Win32 DLLs because they are completely language independent. which expose interfaces that allow applications and other components to access their features. queue. largely to replace the interprocess communication mechanism Dynamic Data Exchanged (DDE) used by the initial release of OLE.NET Enterprise Server product family. each with a unique identity. COM (Component Object Model)²A software architecture developed by Microsoft to build componentbased applications.exe) used to produce a mini-dump image file (i. COM Callable Wrapper (CCW)²A metadata wrapper that allows COM components to access managed .CLR Minidump Tool²A . COM+ 2. COM+ (pronounced "COM plus") makes it easier to design and construct distributed.NET objects. Code Access Security (CAS)²The common language runtime's security model for applications. DCOM. Windows automatically invokes the CLR Minidump Tool prior to running the Dr. The CCW is generated at runtime when a COM client loads a . See also Web Services Platform.NET assembly must first be registered using the Assembly Registration Tool. COM+²The "next generation" of the COM and DCOM software architectures. and Microsoft Transaction Server (MTS) 2. arraylist. COM objects are discrete components.

Content Management Server 2001²Microsoft's server package for building. Common Language Infrastructure (CLI)²The . and provides services such as memory and exception management. and provides much of its functionality by following the rules defined in the Common Type System. The constructor is used to initialize the object and place it in a valid state (e. declares. The constructor method always has the same identifier as the class in which it is defined.Common Intermediate Language (CIL)²The system-independent code generated by a . Common Language Runtime (CLR)²A runtime environment that manages the execution of . debugging and profiling.NET language compiler. setting the values of member variables). an intermediate language (CIL). The CLS specifies a subset of the Common Type System and set of conventions that are adhered to by both programming language designers and framework class library authors. All . and access to the underlying operating system (Win32). .g.NET Framework specification which defines the rules of how the Common Language Runtime defines.NET Framework.NET components must comply to the CTS specification. and security. regardless of the programming language. Constructor²A method that is automatically called when an object is created. and manages types.NET infrastructure that allows applications written in multiple programming languages to operate many different environments without the need to modify the program code. CIL is also referred to as Microsoft Intermediate Language (MSIL). an extensible metadata system.NET program code. The CLI is defined by the standard ECMA-335. and maintaining dynamic content for both private or commercial Web sites. The CLR is a major component of the . The CLI consists of a file format (PE). Cool²The pre-release code name used for C#. Common Type System (CTS)²The . Also known as the Virtual Execution System (VES). deploying. CIL defines a file format for storing managed code as both program instructions and metadata in a single file.NET Framework.. See Destructor. a factored base class library (FCL). Common Language Specification (CLS)²A set of common conventions used to promote interoperability between programming languages and the . a common type system (CTS). Either the ILASM assembler or JIT compiler is then used to convert CIL to native machine code. Common Object File Format (COFF)²See Portable Executable file.

. DCOM (Distributed Component Object Model)²An extension of the Microsoft Component Object Model (COM) that allows COM components to communicate across network boundaries.exe).NET C# command line compiler (csc. service. The data may be located in a file. DCOM uses the Remote Procedure Call (RPC) mechanism to transparently send and receive information between COM components (i. the name stands for "Cryptographic Protocol Type Checker. Delegates are often described as a managed version of a C++ function pointer. in the Windows registry. such as System Management Server. In . deployment is performed using XCOPY or the Windows Installer.Cryptyc²A tool in the Microsoft research division for type-checking security protocols. or content on to one or more computer systems. However. delegates can reference both instance and static (also called shared) methods.NET. Traditional COM components can only perform interprocess communication across process boundaries on the same machine. .NET Framework that allow access to the information a data source.e." CSC²The . More complex deployment applications. A . DCOM was first made available in 1995 with the initial release of Windows NT 4. See Installer Tool.NET Framework. Types that use the class must implement one event handler method per event that must be processed. Programmers may also author their own data providers for use with the .NET DataSet. See Managed providers. A class that needs to raise events must define one delegate per event. while function pointers can only reference static methods. can also be used. D Data provider²A set of classes in the .NET data provider also allows information in a data source to be accessed as an ADO. Deployment²The process of installing an application.NET Framework code. Reflection. Custom Attributes²Attributes defined by a programmer to store the instance of any type in metadata. In fact. clients and servers) on the same network. See Attribute-based programming. Delegate²A mechanism used to implement event handling in . Deployment Manifest²The part of an application that tells the system how to install and maintain an application. or any any type of database server or network resource.

. "The network is the computerTM.and language-neutral and is a standard of the World Wide Web Consortium (W3C). Dispose²A class-only method used to implement an explicit way to release the resources allocated by an object. Is also Microsoft's Dynamic System Initiative. DOM makes the elements of these documents available to a program as data structures. hundreds or thousands of computers on a network to service a single application.NET languages. Also called a derived type. Destructor²In traditional Object Oriented Programming.Derived class²A class that was created based on a previously existing class (i. and is typically called by the destructor or Finialize method of a class. See Assembly Cache. Although the client/server architecture is fundamentally distributed in its design. The dispose method is actually in implementation of the IDisposable interface. base class). A derived class inherits all of the member variables and methods of the base class it is derived from. Distributed architecture²An application architecture in which the components of an application may be distributed across many computers. DSI²Was Microsoft's Distributed System Initiative. In .e. and supplies methods that may be invoked to perform common operations upon the document's structure and data. See Constructor. the distributed model is not limited to only two or three tiers in its design." Download Cache²Part of the assembly cache used to store information downloaded from a private network or the public Internet. Dispose. the destructor method is instead called when the object is garbage collected by the CLR²which happens at some indeterminate time after an object goes out of scope. A distributed. the destructor is actually a syntactic mapping to a Finalize method. In C#. Objects in the download cache are effectively isolated from all other assemblies loaded into other assembly caches. more universal protocol UDDI. n-tier architecture may use many components running on dozens. a destructor is a class method that is called when an object goes out of scope. DOM (Document Object Model)²A programming interface that allows HTML pages and XML documents to be created and modified as if they were program objects. DOM is both platform. It is expected that DISCO will become obsolete in favor of UDDI.. Much of DISCO is now a subset in the newer. DISCO²An Microsoft-created XML protocol used for discovering Web Services. This concept is reflected in Sun Microsystems' visionary phrase.

g. an event handler is called. configuration. See Callback method. or SGML document. management. and how the content should be interpreted by the application reading the document. or collected and stored for later use by technical support personnel.NET Framework. monitoriing. Changes in the format of the document can be easily made by modifying the DTD. a user clicking a button. Warnings.. Support for EIF will be included in the next release of Visual Studio. and diagnostic information can be monitored and reported for immediate. Enterprise Instrumentation Framework (EIF)²A feature that expands the program execution tracing capabilities found in the initial release of the .ecma. and Technical Report TR-84. The C# and CLI specification were ratified by the ECMA on December 31. Everett²The pre-release code name of Visual Studio . E ECMA (European Computer Manufactures Association)²The ECMA (known since 1994 as ECMA International) is an industry association founded in 1961 and dedicated to the standardization of information and communication systems. a window getting focus. In response to an event. and assigned to them the ECMA standards designations of ECMA-334 (C#) and ECMA-335 (CLI). EIF allows the use of configurable event filtering and tracing by integrating . business events. It includes assemssment. runtime analysis by developers. 2001 as international standards." An event may be fired (or raised) in response to the occurrence of a pre-defined action (e.NET 1. Event Handler²A function or method containing program statements that are executed in response to an event.NET. XML. Applications will use a document's DTD to properly read and display a document's contents. or a program starting up or shutting down).0.ch. and development tools. Everett offers increased performance over Visual Studio . a timer indicating a specific interval of time has passed. errors. These standards are available at www.NET 2003. These tools will communicate their status in order improve how they operate. integration with Windows Server 2003 and SQL Server 2003 (Yukon). . Dynamic Systems Initiative (DSI)²A 10-year plan to simplify management of software and hardware.NET applications with the event log and tracing services built into the Windows operating system.DTD (Document Type Definition)²A document defining the format of the contents present between the tags in an HTML. Event²A notification by a program or operating system that "something has happened.

new managed data providers for Oracle and ODBC. A Finalize method is not needed when only managed resources are used by the object. calendaring.NET Compact Framework. Exception Handling²The process of trapping an exception and performing some sort of corrective procedure in response. Exchange Server's features include instant messaging. which are automatically freed by the garbage collector. Exchange Server 2000²A set of Microsoft server applications use to ingrate messaging and data storage technologies. when a destructor is defined in a class it is mapped to a Finalize method. A fatal exception (also called a critical or catastrophic error) is an event that cannot be properly handled to allow the application²or the operating system²to continue running. Finally block²A block of program statements that will be executed regardless if an exception is thrown or not. such as NNTP and HTTP. F Fields²Same as member variables. Exception²A signal that is generated when an unplanned or unexpected event occurs. Web content. realtime conferencing. improved migration tools for VB6 code. and the addition of the Enterprise Instrumentation Framework (EIF) and mobile device support in the form of the . and contact management. Extensible Markup Language (XML)²See XML. The Finalize method is primarily used to free up unmanaged resources allocated by the object before the object itself is removed from memory. Finalize²A class-only method that is automatically called when an object is destroyed by the garbage collector. email. A finally block is typically associated with a try/catch block (although a catch block need not be . Executable file²A file containing program instructions that are executed by an operating system or runtime environment. and applications that are accessible via Internet protocols. In C#. MS Office programmability (the Visual Studio Tools for Office Development). See Dispose.extended support for XML Web services. See Portable Executable file. Also called a finalizer. See try/catch block. Exchange Server can also store documents. Exceptions are typically caught by an exception handler and dealt with in an appropriate way.

GDI (Graphics Device Interface)²A Win32 API that provides Windows applications the ability to access graphical device drivers for displaying 2D graphics and formatted text on both the video and printer output devices. and adds new features and an improved programming model not found in its predecessor GDI. check to verify that methods are used in the proper order. deallocating unmanaged memory. Assemblies are added and removed from the GAC using the Global Assembly Cache Tool. GDI (pronounced "gee dee eye") is found on all version of Windows. Framework Class Library (FCL)²The collective name for the thousands of classes that compose the . Fugue (FCL)² A tool for helping you write better . and text. consuming and producing XML. writing to a database. and SOAP-based XML Web services. Stack values are collected when the stack frame they are declared within ends (e. 98.present to use a finally block). GDI+ (pronounced "gee dee eye plus") provides a set of APIs for rendering 2D graphics. and ME. GDI+ is the currently the only drawing API used by the .. . etc). and much more. you record a set of rules for using a class or interface. G Garbage Collection (GC)²The process of implicitly reclaiming unused memory by the CLR. See GDI+. and support for building Web-based (Web Form) and desktop-based (Windows Form) client applications. It is a "defect detection" tool. and as a separate installation for Windows 2000. images. closing a file.NET applications running on a specific machine. file and network I/O. Global Assembly Cache (GAC)²A reserved area of memory used to store the assemblies of all of the . an assembly must be public (i. Fugue will do things such as check for fields that shouldn't be null. a shared assembly) and have a strong name. To reside in the GAC. The services provided by the FCL include runtime core functionality (basic types and collections. The GAC is necessary for side-by-side execution and for the sharing of assemblies among multiple applications.NET Framework. etc.NET Framework.g.. check for use of objects after they've been disposed. NT. Heap objects are collected sometime after the final reference to them is destroyed.e. Fugue will then verify that the rules are followed.).g. Using Fugue.. accessing system services. interaction with databases.NET code. GDI+ (Graphics Device Interface Plus)²The next generation graphics subsystem for Windows. when a method returns). GDI+ is found natively in Windows XP and the Windows Server 2003 family. This is useful for operations that must be performed regardless if an exception was thrown or not (e.

and is typically conveyed between network hosts using the HTTP protocol.. In . security systems (e.Global Assembly Cache Tool²A . HTML is the standard content display language of the World Wide Web (WWW). images. Also called internationalization. data stores (e. or the personal preference of the user. and scripts. but as a separate program it can be called from batch files. Unix and AS/400).. See localization. .NET languages. DB2). and transaction environments (e. country.g. "Hatteras"²Codename for Team Foundation Version Control tool. ACF/2 and RACF). H Hash Code²A unique number generated to identify each module in an assembly..g. The hash number is based on the actual code in the module itself. regional.exe) used to install. The hash is used to insure that only the proper version of a module is loaded at runtime. This tool is similar in function to the Assembly Cache Viewer that run on Windows Explorer. text. makefiles. and list the contents of the Global Assembly Cache. See Stack. CICS and IMS)..NET programming tool (GACUtil. the software is written to change the locale-specific information it uses to process data and display information to the user based on the configured locale of the operating system. See XHTML. Host Integration Server 2000²A set of Microsoft server applications use to ingrate the . or cultural information based on a single locale.g. Globalized software does not make assumptions about human language. reference types are allocated on the heap..NET platform and applications with non-Microsoft operating systems and hardware (e.g. This is the new version control in Visual Studio 2005.g. satellite assembly. uninstall. HTML is used to describe how the contents of a document (e. HTML (HyperText Markup Language)²A document-layout and hyperlink-specification language. HTML also enables a document to become interactive with other documents and resources by using hypertext links embedded into its content. Heap²An area of memory reserved for use by the CLR for a running programming. and graphics) should be displayed on a video monitor or a printed page. Globalization²The practice of designing and developing software that can be adapted to run in multiple locales. Instead.

encoding. This was originally a part of Longhorn. Interface Definition Language (IDL)²A language used to describe object interfaces by their names.g. is compiled using the Microsoft IDL compiler (MIDL). strMyString. networking and hosting. events.HTTP (Hyper Text Transfer Protocol)²An Internet protocol used to transport content and control information across the World Wide Web (WWW). In C# and VB. methods.. ILDASM²See MSIL Disassembler. Web content typically originates from Web servers (also called HTTP servers) that run services which support the HTTP protocol. MIDL generates both type libraries and proxy and stub code for marshaling parameters between COM interfaces. Microsoft's IDL. . type members. called COM IDL. A compiler uses the IDL information to generate code to pass data between machines. See Qualified identifiers. See Property. The actual Web content is encoded using the HTML or XHTML languages. which is the communications portion of Longhorn that is built around Web services.g. Web clients (i. types. ILASM²See MSIL Assembler. parameters. messaging patterns. Microsoft no longer recommends the use of Hungarian Notation (e.. Temp_Count) when naming identifiers. but is speculated to ship earlier. Indigo ²The code name for for Windows Communication Foundation (WCF). and return types. nMyInteger) or delimiting underscores (e. and variables. This construct is identical to operator[] in C++. I Identifiers²The names that programmers choose for namespaces. and more. security. Indexer²A CLR language feature that allows array-like access to the properties of an object using getter and setter methods and an index value.NET.e. "Indy"²The code-name for a capacity Planning tool being developed by Microsoft. Web browsers) access the content on the server using the rules of the HTTP protocol. identifiers must begin with a letter or underscore and cannot be the same name as a reserved keyword. This communications technology focuses on providing spanning transports..

is an exact copy of the base class or superclass and may extend the functionality of the base class by both adding additional types and methods and overriding existing ones. Isolated storage tool²A . called a derived class or subclass.exe) used to list and remove all existing stores for the current user. and events exposed by an object that allow other objects to access its data and functionality. Instant fields²The member variables in an object instance. Interface contract²The guarantee by an object that it will support all of the elements of its interface. such as the application domain. Inheritance²The ability of a class to be created from another class. Intermediate Language (IL)²See MSIL.NET programming tool (InstallUtil. Isolated storage²A data storage mechanism used by the CLR to insure isolation and type safety by defining standardized ways of associating code with saved data. Interface²The set of properties. In C#.NET programming tool (Storeadm. or the name and path of a file on disk. all necessary files are saved to the application base folder and the required resources are created.Installer Tool²A . Other forms of security credentials. which declares a reference type that encapsulates the contract. During installation. this contract is created by the use of the Interface keyword. indexers.exe) used to install or uninstall one or more assemblies by executing the installer components contained within an assembly. Intrinsic Types²See Built-in Types. can also be used to identify the isolated data. Data contained in isolated storage is always identified by user and by assembly. See Isolated storage. methods. The new class. rather than by an address in memory. . Internet Security and Acceleration Server 2000²A set of applications used to provide firewall security and Web caching services to a single Web site or to an enterprise-scale Web farm. An object guarantees that it will support all of the elements of its interface by way of an interface contract. including the uninstallation information.

threading control. Windows. J2EE is a competitor to the Microsoft .NET Framework and to create . and application environments (e. such as cellular telephones and Personal Digital Assistants (PDA). J2ME (Java 2 Micro Edition)²A Java-based. A Microsoft-supported language for . extensible presence. See the java.. deploying. J2SE is the core Java technology platform and is a competitor to the Microsoft . J# (pronounced "jay sharp") is Microsoft's implementation of the Java programming language. See Java Language Conversion Assistant. runtime platform created by Sun Microsystems used for developing. Tools are also available that allow existing Java and Microsoft J++ code to be migrated to J#. and security for both local network and Internet use. runtime platform that provides many features for developing Web-based Java applications. CORBA interface technology.NET. including database access (JDBC API). Because J# compiles to MSIL and not Java bytecodes.g. . J2EE (Java 2 Enterprise Edition)²A Java-based. It specifically designed to allow Java-language developers to easily transition to the . J# applications are not compatible with the Java Virtual Machine (JVM) or the Java 2 platform. However.NET Compact Framework.sun.Istanbul²The code name for the newest member of the Microsoft Office System ² predicted to be out in 2005 ² that will provide integrated communications capabilities including instant messaging. Run AnywhereTM" portability). and transaction management. A Java application has the ability to run on many different types of computers. scalable architecture.NET Framework.g. Web browsers) without requiring any changes to its code (this technology is referred to by Sun as "Write Once. J2SE (Java 2 Standard Edition)²A Java-based.. Java²A computing platform and programming language released by Sun Microsystems in 1995. Linux and UNIX). J J# (J-Sharp). and managing multi-tier server-centric applications on an enterprise-wide scale. devices. operating systems (e.NET applications. runtime platform created by Sun Microsystems that allows Java applications to run on embedded devices. J# applications can be written using Visual Studio . Macintosh.NET Framework and the J# language. PC-based voice and video.NET Framework.NET and then compiled using third-party Java tools. J2EE builds on the features of J2SE and adds distributed communication. and telephony integration. The Java 2 platform and language is a competitor to the Microsoft . J2ME is a competitor to the Microsoft .comWebsite.

and access to the . The JVM is the Java equivalent of the . The C# language defines about 80 keywords. such as bool. and WithEvents.licenses files that can be embedded in a CLR executable. JScript . a Web browser running the Java program)..NET (pronounced "jay script dot net") is Microsoft's "next generation" implementation of the JavaScript programming language. such as true compiled code. Just In Time (JIT)²The concept of only compiling units of code just as they are needed at runtime. class.NET include Boolean. Public. . Java Virtual Machine (JVM)²A component of the Java runtime environment that JIT²compiles Java bytecodes. schedules threads. and adds features. JScript . and is one of the . packages.NET application is executed. License Compiler²A .NET programming tool (lc. The JIT compiler in the CLR compiles MSIL instructions to native machine code as a .NET Framework. L "Ladybug"²Code-name for product officially known as the Microsoft Developer Network Product Feedback Center where testers can submit online bug reports and provide product suggestions via the Web. Keywords may not be used as identifiers in program code. K Keywords²Names that have been reserved for special use in a programming language. static.NET²A Microsoft-supported language for .Java Language Conversion Assistant (JLCA)²A tool used to convert Java-language source code into C# or J# code. The compilation occurs as each method is called. and while.NET.NET Framework.g. and interacts with the host operating environment (e. cross-language support.NET includes all of the features found in the JScript language. JLCA aides in the migration of Java 2 applications to the Microsoft .exe) used to produce . JScript . Function. Event. the JIT-compiled code is cached in memory and is never recompiled more than once during the program's execution. The 160 or so keywords reserved in VB.NET Framework's CLR. namespace. manages memory.NET Framework Migration Tools created by ArtinSoft for Microsoft. but also provides support for true objectoriented scripting using classes and types.

and character classification. resolve file dependency information. This version is to unify the Windows CE. better keyboard support. Lonestar²The codename for Windows XP Tablet PC Edition 2005. Localization²The practice of designing and developing software that will properly used all of the conventions defined for a specific locale. M "Magneto"²The code-name for Windows Mobile 5. Microsoft's nmake program has no relation to the nmake program originally created by AT&T Bell Labs and now maintained by Lucent. cultural and regional contexts (semantics). makefiles) that contain instructions that detail how to build applications. Longhorn API²The application programming interface for the Longhorn operating system. . See Globalization. Also call the application assembly cache. sorting rules.. Local Variable²Same as a member variable. and SmartPhone platforms. From the time an object is instantiated to the time it is destroyed by the garbage collector. Make Utility²A . PocketPC. Local assembly cache²The assembly cache that stores the compiled classes and methods specific to an application. This platform includes a new user interface. See Global Assembly Cache. and access a source code control system. Each application directory contains a \bin subdirectory which stores the files of the local assembly cache. Longhorn²The "next generation" release of Windows Server after Windows Server 2003 and named Microsoft Windows Vista. date and time formats. Although identical in name and purpose these two tools are not compatible. and more.e. numeric and monetary conventions.NET programming tool (nmake.0.Lifetime²The duration from an objects existence.exe) used to interpret script files (i. Locale²A collection of rules and data specific to a spoken and/or written language and/or a geographic area. Locale information includes human languages. See Lucent nmake Web site. See Localization. improved video support.

Managed code²Code that is executed by the CLR.Data. or the address where the next element just past the end of an array would be stored. Managed pointers²A pointer that directly references the memory of a managed object. its MSIL-encoded instructions are JIT-compiled to the native code of the processor. Managed execution²The process used by the CLR to execute managed code.NET Data Provider (System. See as Visual C++ .e. store and retrieve security information. Used to point to unmanaged data.NET objects that provide managed access to services using a simplified data access architecture.NET managed providers operate completely within the bounds of the CLR and require no interaction with COM interfaces.. the Win32 API. Managed code provides information (i. . Each subsequent time the same method is called. an element of an array. Each time a method in an object is called for the first time. Managed Extensions for C++²Language extensions added to the C++ language that enable developers to write code that makes use of the . such as COM objects and some parameters of Win32 API functions. Managed pointer types²An object reference that is managed by the CLR.Managed ASP²Same as ASP. or other unmanaged code. The most common examples of managed providers are the data providers.Data. the previous JIT-compiled code is executed. and ADO Managed (System.NET. Managed C++²Same as Visual C++ . Managed resources²A resource that is part of an assembly.NET.Data.ADO).Odbc). Managed code can access both managed data and unmanaged data.NET Framework's CLR. metadata) to allow the CLR to locate methods encoded in assembly modules. Managed pointers may point to the field of an object or value type. and walk the program stack. OLE DB . . such as SQL Server Managed Provider (System. handle exceptions.SqlClient). Managed data can only be accessed by managed code. Managed providers². Manifest²See Assembly manifest. The functionality of a provider is accessed via one or more object interfaces. Managed data²Memory that is allocated and released by the CLR using Garbage Collection. Compiling and execution continued until the program terminates.NET.

The MSIL . Metadata²All information used by the CLR to describe and reference types and assemblies. Method²A function defined within a class. including BizTalk Server 2000.g. It appears that it could become a competitor to PDF and Adobe's PostScript. enterprise data.Marshaling²The process of preparing an object to be moved across a context. Mobile Information Server 2002²A set of applications used for extending Microsoft . "Metro"²Code-name for a set of print document specifications along with the set of printer drivers.NET).0 data engine. Host Integration Server 2000. Features include network gateway. process. SMS) and integration with Windows 2000.NET applications. security (SSL. VPN). Methods (along with events) defined the behavior of an object. C# and VB. and is an interchange medium for program information between tools (e. which are DLLs that must be combined into assemblies to be used. Also called fields. notification routing. SQL Server 2000. and intranet content to mobile client devices such as cell phones and Personal Digital Assistants (PDA). The MSDE a modern replacement for the older Microsoft Jet database technology. This is being built as a part of Longhorn. MSDE 2000 (Microsoft Data Engine)²A light weight release of the SQL Server 7. Member variables²Typed memory locations used to store values. compilers and debuggers) and execution environments. mobile device support (WAP. MSIL (Microsoft Intermediate Language)²The machine-independent language into which .NET Framework.g. Module²A subunit of an assembly. or application domain boundary. IPSec.. The assembly manifest (sometimes called a module manifest) describes all of the modules associated with an assembly.NET. See MSIL.NET applications are compiled using a high-level . MIDL (Microsoft Interface Definition Language) Compiler²The program used to compile Interface Definition Language (IDL) files into type libraries. The MSDE is used as a relational data store on many Microsoft products. Visual Studio. Members²See Class members.NET language compiler (e. and the .. Metadata is independent of any programming language. Assemblies contain one or more modules. See Remoting.

identifiers) used within a program. MSIL Assembler²A .e. because it makes JIT-compiling the assembly unnecessary.exe) for Longhorn applications. A namespace only contains the name of a type and not the type itself.. Also called object code and machine code. Intel x86 and Sun UltraSPARC). Native code for a specific family of CPUs is not usable by a computer using different CPU architectures (c. System. For example. During execution the native image will be used each time the assembly is accessed rather than the MSIL assembly itself.NET programming tool ( gen. Using Ngen to create a native image file is often referred to as pre-JITting. which compiles the MSIL instructions to machine language just prior to its execution.output is then used as the input of the Just-In-Time (JIT) compiler.exe) used to compile a managed assembly to native machine code and install it in the local assembly cache.. MSIL can also be converted to native machine object code using the Native Image Generator utility. Also called name scope. The use of an assembly manifest to identify all of the files in a multi-module assembly is required. Native Image Generator²A . N Namespace²A logical grouping of the names (i.f. the CLR reverts to using the original MSIL assembly by default.NET programming tool (ILDAsm. If the native image is removed. MSBuild²The build tool (MSBuild.exe) used to translate a portable executable (PE) file containing MSIL code to an an MSIL file that can be used as input to MSIL Assembler.NET program which is contained in many modules and resource files.   .exe) used to create MSIL portable executable (PE) files directly from MSIL code. MSIL Disassembler²A . Native code²Machine-readable instructions that are created for a specific CPU architecture. which must be Just-In-Time (JIT) compiled by the CLR. A programmer defines multiple namespaces as a way to logically group identifiers based on their use.Windows are two namespaces containing each containing types used for for different purposes. Multi-module Assembly²A . Native images are faster to load and execute than MSIL assemblies.NET programming tool (ILAsm. The name used for any identifier may only appear once in any namespace.Drawing and System.

NET Compact Framework²A port of the . services and providers that are used to construct . security. See . and enterprise security policy levels. . SQL Server 2000 . The fundamental elements of the FCL are defined as classes located in the System namespace..NET Data Provider²See Data provider. and add. allowing embedded and mobile devices to run .NET. This tool loads and registers an assembly.msc) used to adjust code access security policy at the machine. Thousands of more classes are located in second. including built-in value types. . graphics. deploying. Content Management Server. user. interfaces.NET programming tool (Mscorcfg. Exchange Server. and support for exception handling and garbage collection.NET Framework to Windows CE. and running applications and services that use .NET Framework²A programming infrastructure created by Microsoft for building. All of the most primitive aspects of .NET technologies. Host Integration Server. such as desktop applications and Web services. .NET Framework contains three major parts: the Common Language Runtime (CLR).NET are stored in System. ..NET Framework Class Library (FCL)²The foundation of classes. See Smart Device Extensions.NET) applications.0 application. the Object type. the Framework Class Library. Trojan horses and spyware and could double as a Digital Rights Management tool to authenticate who is allowed to see a file or use a program. . and delete assemblies in the Global Assembly Cache.NET programming tool (Regsvcs.NET Framework desktop and Web-based (i. The . value types. BizTalk Server. See Global Assembly Cache Utility. .NET applications. and Windows 2000 Server.e.NET Enterprise Server product family²These products include Application Center. Internet Security and Acceleration Server.NET Compact Framework. configuration management. This tool can also be used to configure remoting services. and Web services. NGSCB²Next-Generation Secure Computing Base²A virtual vault residing within each computer that lets users store encrypted information and only authorize certain entities to see it. and installs a type library into a specified COM+ 1. generates. . and ASP. Commerce Server.NET Services Installation Tool²A . configure.and third-level namespaces that include support for network and file I/O. Formerly known as BackOffice Server 2000.NET Framework Configuration Tool²A .exe) used to add managed classes to Windows 2000 Component Services. registers. It also provides protection for critical data against virus attacks. All CLS-compliant compilers can use the FCL. ASP.

P Palladium²Former code name for Microsoft's Next-Generation Secure Computing Base (NGSCB) project.NET to be released near the time Microsoft Longhorn is released. Analogously. OLE is often confused with the Component Object Model (COM). "Pheonix"²A software optimization and analysis framework that is to be the basis for all future Microsoft compiler technologies. Common examples include using Microsoft Word to embed an Excel spreadsheet file into a Word document file. because COM was released as part of OLE2.NET before its release. or emailing a Microsoft Power Point file as an attachment (link) in Microsoft Outlook. Overloading²Using a single identifier to refer to multiple methods that differ by their parameters and/or return type. This follows the release of Visual Studio . and an object is the functional. Object type²The most fundamental base type (System. O Object²The instance of a class that is unique and self-describing. A class defines an object.NET Framework types are derived from. OLE (Object Linking and Embedding)²A Microsoft technology that allows an application to link or embed into itself documents created by another type of application. if a class is a cookie cutter then the cookies are the objects the cutter was used to create. However. Overriding²To supercede an instance field or virtual method in a base class with a new definition of that field or method in the derived class.NGWS²Next Generation Web Service²This was one of the pre-release names for .NET Whidbey.Object) that all other . COM and OLE are two separate technologies. Orcas²The code name for the version of Visual Studio . . realization of the class.

floating point. typically at the time of garbage collection. The EXE and DLL files created using the . Pre-defined reference types are object and string references.NET compilers always generate type-safe code.asp. Portable Executable Verifier²A . References to the private assembly will only be resolved locally to the application directory it is installed in. See Shared assembly. Pinned²A block of memory that is marked as unmovable. A common example is when a pointer is used to pass a reference to a buffer to a Win32 API function. Pinning is necessary for managed pointer types that will be used to work with unmanaged code and expect the data to always reside at the same location in memory. decimal.com/hwdev/hardware/PECOFF. Portable Executable (PE) file²The file format defining the structure that all executable files (EXE) and Dynamic Link Libraries (DLL) must use to allow them to be loaded and executed by Windows. such as an object or value type. Blocks of memory are normally moved at the discretion of the CLR. The location is the starting point of an allocated object. A private assembly will run only with the application with which it was built and deployed. Pointer types²See Managed pointer types. Pre-defined types²Types defined by the CLR in the System namespace. This version will follow Windows Mobiles 2005 (code-named "Magneto").NET Framework obey the PE/COFF formats and also add additional header and data sections to the files that are only used by the CLR. the pointer reference would become invalid."Photon"²A feature-rich upgrade to Windows Mobile that includes features such as battery life. If the buffer were to be moved in memory. See User-defined types.exe) used to verify that a . . this tool is used primarily with third-party ILASM-based compilers to debug possible code generation problems. PE is derived from the Microsoft Common Object File Format (COFF). The pre-defined values types are integer. Private assembly²An assembly that is used only by a single application. Because Microsoft .NET compiler has created type-safe metadata and MSIL code. or the element of an array. and boolean values. The specification for the PE/COFF file formats is available at www. character. Pointer²A variable that contains the address of a location in memory.microsoft. so it must be pinned to its initial location.NET programming tool (PEVerify. Pre-JIT compiler²Another name for the Native Image Generator tool used to convert MSIL and metadata assemblies to native machine code executables. Unmanaged pointer types.

or on different computers connected by a network. See Marshaling. modify its own behavior by using late-binding and dynamic invocation (i. See Value types. Only namespace declarations use qualified identifiers (e. Reference types include array. Remoting is the . Reflection²A feature that allows an application to query its own metadata. delegate. Reference types²A variable that stores a reference to data located elsewhere in memory rather than to the actual data itself.e. Register Assembly Tool²Same as Assembly Registration Tool. Reflection (System.) to call Office code.Windows. Project Green² code name for Microsoft's next-generation ERP product code base. See Indexer.NET Services Installation Tool. Pointer types..NET replacement for Distributed COM (DCOM). Q Qualified identifiers²Two or more identifiers that are connected by a dot character (. etc. or create new types at runtime (Reflection Emit). .Reflection) allows an application to discover information about itself so that it may display this information to the user.g. class. and interface. See Attribute-based programming. Property²A CLR language feature that allows the value of a single member variable to be modified using getter and setter methods defined in a class or structure. Register Services Utility²Same as . Objects using remoting may be on the same computer.).Forms).NET technology that allows objects residing in different application domains to communicate. C#.Primary Interop Assemblies (PIAs)²Assemblies that come with Microsoft Office 2003 that allow managed code (VB . Objects in different application domains are said to be separated by a remoting boundary.NET.. R R2²The codename for the Windows Server 2003 Update due in 2005. binding to and calling methods at runtime). System. Remoting²A .

files. and query result sets. See COM Callable Wrapper (CCW). For non-OLE automation interfaces.resx files to . Seamless computing is being realized with the improvements in hardware (voice. vector drawings. message queues. or compiled into satellite assemblies using the Assembly Linking Utility. In some contexts.resource files that can be embedded in a runtime. Saturn²the code name for the original ASP. application services themselves.NET application at runtime without the need to recompile the code. such as Web services. and loaded into a .NET application to store localized data.NET assembly that is generated from the COM component's type library using the Type Library Importer tool. are referred to as resources. .NET programming tool (CorDbg. binary executable. Satellite assemblies are created by compiling .exe) used to convert the resource information stored in text files or XML . Examples include the . data streams. Seamless Computing²A term indicating that a user should be able to find and use information effortlessly. Runtime Callable Wrapper (RCW)²A metadata wrapper that allows COM components to be called from .NET applications.Resource²An addressable unit of data that is available for use by an application. Resource File Generator Tool²A .resource files using the Assembly Linking Utility. The hardware and software within a system should work in an intuitive manner to make it seamless for the user.exe) used as a command-line. Satellite assembles can be added.NET Common Language Runtime and the Java Virtual Machine (JVM). For OLE automation interfaces. Satellite assemblies are typically used by . See CLR Debugger. a custom RCW must be written that manually maps the types exposed by the COM interface to . S Satellite assembly²An assembly that contains only resources and no executable code. documents. bitmapped images. an RCW is a managed . Resources include text strings.NET Framework-compatible types. multimedia) and software.NET Web Matrix product. modified. binary data.NET programming tool (Resgen. source-level debugging utility for MSIL programs. Runtime Debugger²A . ink. Runtime host²A runtime environment used to manage the execution of program code.

a database). HTML and XML) are subsets of SGML. Examples include server-side scripting. SGML is very flexible and feature-rich. Server²A computer program or system that provides information or services requested by a client. Serialization²The conversion of an object instance to a data stream of byte values. Serialization is performed by the CLR and occurs when an object must be converted to a persistent form to be stored in an information retrieval system (e. application domain. newer markup languages requiring fewer features (e. managed-code. See Private assembly...g.g... programmatic interface (i. See Client-side.g.NET programming tool (Sn..e. As a result. on media (e. . an API). or when marshaled across a context. Services are an essential part of distributed architecture program design. or machine boundary. or use asynchronous. Shared name utility²A . runtime environment within the Microsoft Longhorn Operating System that helps to protected against deviant applications. a file on a disk). Also called published name. This is a part of Microsoft's "Trustworthy Computing" initiative.Secure Execution Environment (SEE)²A secure. Server-side²An operation or event that occurs on a server system. Shared assembly²An assembly that can be referenced by more than one application.exe) used to verify assemblies and their key information and to generate key files.g. and server-side processing. SGML (Standard Generalized Markup Language)²The standard markup language used by the publishing industry to specify the format and layout of both paper and electronic documents. HTTP. and it is very difficult to write a full-featured SGML parser. Services are typically non-human-interactive applications that run on servers and interact with applications via an interface. XML. Service²An application that provides information and/or functionality to other applications. See Client/Server architecture. SGML is defined by the international standard ISO 8879. process. server-side objects. A service may expose a synchronous. Shared name²Same as a strong name. and SOAP) to remain very loosely-coupled with consumers. allowing it to be tightly-coupled with a consumer. message-based communications (e. Shared assemblies must be built with a strong name and are loaded into the Global Assembly Cache. This utility is also used to create strong names for assemblies.

NET languages. Stack²An area of program memory used to store local program variables.NET Enterprise Server product family.NET Compact Framework. and return values. Assemblies must be specifically (and carefully) coded to make use of side-by-side execution. method parameters.NET programming tool (SoapSuds.NET 1.NET operating system and the Microsoft .NET Compact Framework Static methods²Types that declare methods which are associated with a type rather than an instance of the type. and HTTP.NET 2003. Static fields may be access without first instantiating their associated type. Static methods may be called without first instantiating their associated type. and Model checking. Languages.NET program in which all components are combined into a single DLL or EXE file. In .Side-by-Side Execution²Running multiple versions of the same assembly simultaneously on the same computer. Starlite²A code name for the original Microsoft . . This tool is used primarily to compile client applications that communicate with XML Web services using remoting.exe) used to create XML schemas for services in a .NET assembly. Single-module assembly²A . SDE will be fully integrated into Visual Studio . SOAP messages are independent of any operating system or protocol. SLAM²A project for investigating the relationships between software Specifications. MIME. Analysis. SQL Server 2000²Microsoft's enterprise-scale relational database and member of the . Smart Device Extensions (SDE)²An installable SDK that allows Visual Studio . See Heap. or even in the same process.0 to be used for developing . and may be transported using a variety of Internet protocols. XML-based messaging protocol used to encode the information in Web service request and response messages before sending them over a network. and to create an assembly from an XML schema. Such an assembly does not require an assembly manifest. value types are allocated on the stack.NET application for the Pocket PC and other handheld devices that support the Microsoft Windows CE . Static fields²Types that declare member variables which are associated with a type rather than an instance of the type. including SMTP. SOAP (Simple Object Access Protocol)²A lightweight. SoapSuds Tool²A .

operators. structures are light-weight classes that are simpler.). Strong names are created using the Shared name utility. also support properties. Web browser. such as server configuration information. Strongly-typed²A programming language is said to be strongly-typed when it pre-defines specific primitive data types. custom constructors. and no compile-time initialization of instance fields. A public key encryption scheme is used to create a digital signature to insure that the strong name is truly different than all other names created at anytime and anywhere in the known universe. authenticate who created the assembly. It is important to note that a structure is a value type.. The SDM defines a system.. and document its configuration requirements. It includes a means for the system to compose other systems and subsystems. Structure²In . Also called templates. an SDM document can be a simple. constructors. structures do not support inheritance. Additional information can be added to flesh out semantics.g. access modifiers. Structures are typically used for creating user-defined types that contain only public fields and no properties (identical to structures in the C language).NET languages. Stylesheets²Data files used to express how the structured content of a document should be presented on a particular physical medium (e. and enforces their proper use by imposing rigorous rules upon the programmer for the sake of creating robust code that is consistent in its execution. Performance will suffer when using structures in a situation where references are expected (e. Details of the presentation include font style. service level agreements. and other information. a destructor (or Finalize) method.g. and indexers. have less overhead. System Definition Model (SDM)²An XML document that follows a system throughout its life and is kept updated as a system moves from the initial design and development stages through its lifecycle and into maintenance. When initially created. hand-held device. (From An Overview of Microsoft's Whitehorse. nested types.) System Center²A brand name for Microsoft's systems management products (it is no longer a 'bundled' product). like classes. however. methods. etc. requires that all constants and variables be declared of a specific type. and are less demanding on the CLR.NET structures. which includes hardware and software resources. The digital signature also makes it easy to encrypt the assembly. But . health models.Strong name²An assembly name that is globally unique among all . while classes are a reference type. lay out.NET assemblies. and to validate that the assembly hasn't been corrupted or tampered with. skeletal view of a system. printed pages. security and connection policies. in collections) and the structure must be boxed and unboxed for it to be used. expose its endpoints for communication purposes. . Unlike classes. and pagination.

Trustbridge²A directory-enabled middleware that supports the federating of identities across corporate boundaries.NET (a.. The associated catch block contains program statements that handle any exception that is thrown in the try block. The exception is said to be thrown. etc. See Finally block. Type library²A compiled file (. The PEVerify tool can also be used to verify if code is type-safe. It is designed to help companies model. and DLL . which is verified to be type-safe during JIT-compilation. and delegates. overflow. deploy and manage network resources.k. A try block contains a set of program statements that may possibly throw an exception when executed. Types²A set of data and function members that are combined to form the modular units used to build a . standard modules.x). Multiple catch blocks may be defined to catch specific exceptions (e. Type-safe²Code that accesses only the memory locations it is authorized to access. Try/Catch block²An exception handling mechanism in program code. See Type members. Targeted for shipping in July of 2005.a. Windows CE 4. The server will push the patches out to desktops and servers. See Exception Handling.). classes. Types include enumerations. Pre-defined types exist within the CLR and user-defined types are created by programmers. Windows Server Update Services (WSUS)²A free server for downloading patches from Microsoft that can be used by corporations.tlb) containing metadata that describes interfaces and data types.g. The C# and VB. Type-safe code cannot perform an operation on an object that is invalid for that object. Type libraries can be used to describe vtable interfaces.NET language compilers always produce type-safe code. regular functions. and only in welldefined. allowable ways. Programmers can also programmatically force an exception to be thrown by the use of the throw statement. the CLR generates an exception as an alert that the condition occurred. divide by zero. T "Talisker"²The pre-release code name for Windows CE . structures.System Center Capacity Manager²A capacity planning tool from Microsoft due out by the end of 2005. COM components. interfaces.. Throwing²When an abnormal or unexpected condition occurs in a running application.NET applications.

Unmanaged²An adjective generally applied to any code or data that is outside of the control of a runtime host environment. Discovery. Also called unsafe code. accessing unmanaged areas of memory. In . Type Library Exporter²A . Windows handles and calls to the Win32 API). memory) that is allocated outside of the control of the CLR. Unboxing²Conversion of a reference type object (i. interfacing to COM components. System. Unmanaged code²Any code that executes outside of the control of the .NET assembly. Unmanaged data²Data (i. any objects or resources not allocated and controlled by the CLR are considered unmanaged (e. Unboxing must be explicitly performed in code. Unmanaged code may perform unsafe operations. Typelib²A type library. and writing performance-critical routines that are not encumbered by the overhead of the CLR.and SOAP-based lookup service for Web service consumers to locate Web Services and programmable resources available on a network. Type libraries are compiled from Interface Definition Language (IDL) files using the MIDL compiler.exe) used to create a managed . usually in the form of a cast operation. Type members²Same as class members.NET programming tool (TlbExp.g.NET types. Unmanaged data can be access by both managed and unmanaged code.NET.NET programming tool (TlbImp. take the address of a variable..NET assembly from a COM type library by mapping the metadata-encoded definitions to the appropriate . and perform conversions between pointers and integral types. such as declare and operate on pointers. Also used by Web service providers to advertise the existence of their Web services to consumers.exe) used to create a COM type library file based on the public types defined within a specified . Uses of unmanaged code include calling operating system APIs. U UDDI (Universal Description. Type Library Importer²A .Object) to its value type instance.modules.e. and Integration)²An XML. .NET Common Language Runtime. See Boxing.e.

decimal.NET applications. Version number²See Assembly version number. The type of the variable determines what kind of data it can store. a pointer that store a reference to an unmanaged object or area of memory. V Value types²A variable that stores actual data rather than a reference to data. VB7). Value types have the minimal memory overhead and are the fastest to access.NET Framework. Unmanaged resources²Objects created and manipulated outside of the control of the CLR. Code written in Visual C++ . Vienna²Code name for the Microsoft Office Live Communications Server 2005 (LCS 2005) beta. and to easily migrate legacy C++ code to the . code written in the legacy Visual C++ language is sometimes referred to as unmanaged C++. See Types. VB. array elements. floating point number.NET makes a better alternative to Visual Notepad for creating .NET Framework.NET Framework. Pointer types.a.NET (VB. parameters. character. Examples of variables include local variables. See Pre-defined types.k. Officially called Microsoft Visual Studio .NET allows developers to use the C++ language to write managed applications.NET 2002. Visual C++ . Examples includes file handles opened using the Win32 API.. . and database connections obtained using ODBC. Simple value types include the integer. That is.Unmanaged pointer types²Any pointer type that is not managed by the CLR.NET applications.NET)²A Microsoft-supported language for the . Visual Studio . Visual Basic . VS . Unsafe²Same as unmanaged. See Reference types. and boolean types. static fields and instance fields. Interactive Development Environment (IDE) created by Microsoft for the development of . Variable²A typed storage location in memory.NET (VS . Visual C++ . which is stored elsewhere in memory.NET is the "next generation" release of the very popular Visual Basic programming language (a.NET)²A full-featured.NET²A Microsoft-supported language for .NET is also referred to as managed C++. User-defined types²Reference (object) types defined in code by a programmer.

See also COM+ 2. This version is due to release in 2005. and UDDI.NET Framework object that allows development of Web-based applications and Web sites. HTTP. Web service consumer²An application that uses Internet protocols to access the information and functionality made available by a Web service provider. The Web Matrix Project²A free WSIWIG development product (IDE)for doing ASP.NET that was also known by the code name Whidbey. See Windows form. This version includes enterprise-level tools and more.0. Visual Studio Team System 2005 (VS . The most recent version²The Web Matrix Project (Revisited)²can be found here. Web service²An application hosted on a Web server that provides information and services to other network applications using the HTTP and XML protocols. Codename for this product was known as "Burton". A Web service is conceptually an URLaddressable library of functionality that is completely independent of the consumer and stateless in its operation. Web service provider²A network application that uses Internet protocols to advertise and provide services to Web service consumers.NET Web Services architecture. W Web Form²A .NET that was also known by the code name Everett.NET)²A high-end skew for Visual Studio 2005.NET development that was released as a community project. Web Service Platform²This was one of the pre-release names for the original Microsoft . . See Web service. See Web service. These protocols include WSDL. Web Service Protocols²Open communication standards that are key technologies in the . SOAP.NET Framework.NET 2003 (VS . XML. Visual Studio 2005(VS .NET)²The second version of Visual Studio .Visual Studio .NET)²The third version of Visual Studio .

Windows Forms Class Viewer²A .NET Remoting to Windows Services ² for building connected systems.exe) used to locate the URLs of XML Web services located on a Web server. See An Overview of Microsoft's Whitehorse. return value. See DISCO. and bindings.NET programming tool (Wsdl. .0 and will be replaced by Windows Server 2003. and more. WSDL will eventually replace Microsoft's earlier Web Services discovery protocol. This communications technology focuses on providing spanning transports. this WCF will deliver a consistent experience ² bringing together technologies ranging from Web Services to . Whistler²The pre-release code name used for Windows XP.exe) used to search for and display the namespace and class information within an assembly.exe) used to create service descriptions and generate proxies for ASP. and save the information related to the resources of each XML Web service to a set of files. messaging patterns. WCF is the communications portion of Windows Vista that is built around Web services. DISCO. Windows Communication Foundation (WCF)²Previously code named "Indigo".Web Services Description Language (WSDL)²An XML-based contract language for describing the network services offered by a Web service provider via UDDI.1. data types of all parameters. Web Services Discovery Tool²A . security. encoding. Web Services Description Language Tool²A . Windows 2000 Server²The central server operating system of the Microsoft BackOffice Server 2000 product family.NET programming tool (WinCV. WSDL describes a Web service to Web service consumers by its public methods. Whidbey²The pre-release code name for the "next generation" release of Visual Studio after Everett and prior to Longhorn. See the document Web Services Description Language (WSDL) 1.NET Web service methods. These files can be used as input to the Web Services Description Language Tool to create XML Web service clients.NET programming tool (Disco. Windows 2000 Sever (also known as Windows NT 5) is the successor of Windows NT Server 4. Ultimately. Whitehorse²The code name for the set of modeling tools included in Micrsoft Visual Studio 2005 ("Whidbey"). networking and hosting.

WinFX²The new Windows API that will be released with the Microsoft Longhorn Operating System. More correctly stated.NET Server 2003²The original name of Windows Server 2003. Windows Installer must be used. WinFS²("Windows Future System") The code name for the new type-aware. and WinFS as well as a number of fundamental routines. Windows Server 2003²The next generation of Windows 2000 Server that offers tighter integration with the .NET applications can be successfully deployed using XCOPY. Due out by end of 2005. such as changes in system configuration.NET Server 2003. Also called WinForms. which was code named Longhorn.. The ". transactional.exe) used to help a programmer modify localization information in a Windows Form. media. display. You can associate relationships between information and these associations can be used to access what is stored on your machine. Windows Installer²The software installation and configuration service for Windows 2000 and Windows XP.NET Framework object that allows the development of "traditional" Windows desktop applications. and greater support for Web services using Internet Information Server 6. This system is expected to use vector graphics.Windows Forms Resource Editor²A . .NET" was dropped as part of an attempt to remarket the concept of . Windows Presentation Foundation (WPF)²Previously code named "Avalon". WinFS allows various kinds of data and information stored on your machine to be associated and categorized. This will include features for Avalon. See Web Form. if a deployment requires complex tasks.NET Framework. groups. Windows Form²A . but instead as a business strategy. allow for better transparency. Windows Installer 2. and user interfaces. or folders. WPF is often referred to as the graphical subsystem of Windows Vista. Most . etc. However. and more. Windows . it is the way in which Windows Vista will create. This product was formerly known as Windows . and manipulate documents. unified file system and programming model that will be a key part of Longhorn.0 is required for use by the . it is also available for Windows 9x and Windows NT.NET not as a product.NET Framework. Indigo. creation of user. Windows Vista²The "next generation" client release of the Windows Operating System after Windows Server 2003.NET programming tool (Winres.0 and XML and UDDI services. Windows Update ²A site maintained by Microsoft for patch updates.

Although nearly identical to HTML. Applications requiring more complex tasks to be performed during installation require the use of the Microsoft Windows Installer. similar to the hyperlinks found in HTML Web pages.. and more. XCOPY²An MS-DOS file copy program used to deploy .NET applications can be installed by simply being copied from one location (e. Because .) to another.0. Xlink (XML Linking Language)²A language that allows links to other resources to be embedded in XML documents. All object modules are viewed at once before generating code. XDR (XML Data-Reduced)²A reduced version of XML Schema used prior to the release of XML Schema 1. CD-ROM.WPO²Whole Program Optimization²This is an optimization that can be done by the C++ compiler.01 with the the syntax of XML. Longhorn applications can be created by using XAML for the interface definition and managed procedure code for other logic. directory. XML was specifically designed to describe data. XDA²A consolidated development environment that allows programs to be created for Windows. XML is a subset of SGML and has become the standard language for storing. XBoxes. See the document XML Linking Language (XLink) Version 1. XHTML (eXtensible HyperText Markup Language)²The next generation of HTML. HTML was originally designed to display data. XML (eXtensible Markup Language)²A meta-markup language that provides a format for describing almost any type of structured data.NET applications. etc.0. XHTML is a combination of all the elements in HTML 4. and manipulation Web-based data. XML allows the creation of custom tags to describe . thus resulting in well-formed Web pages that are more portable across a wide range of Web browsers. viewing.NET assemblies are self-describing and not bound to the Windows registry as COM-based application are. most . X XAML²(Extensible Application Markup Language) The declarative markup language for Longhorn that allows an interface to be defined. which allows for additional optimizations to be performed. machine.g. XHTML has much stricter rules and is cleaner in its syntax.

NET programming tool (Xsd. Schemas are written in XSD and support namespaces and data types. XPointer (XML Pointer Language)²A language that supports addressing into the internal structures of XML documents. XML Web services are accessed via standard Web protocols and data formats such as HTTP. XPath information is processed using XSLT or XPointer. See the document Extensible Stylesheet Language (XSL) Version 1. XML Schema Definition Tool² A .both proprietary data and business logic. XSLT is designed for use as part of XSL. .NET applications that provide services (i. See the document XSL Transformations (XSLT) Version 1. Web service consumers). XSL (eXtensible Stylesheet Language)²A language used for creating stylesheets for XML documents. See the document XML Schema Part 0: Primer.0. character content.. See the document XML Path Language (XPath) Version 1. XPointer allows the traversals of an XML document tree and selection of its internal parts based on element types. XML Web services²Web-based . XPointer is based on the XML Path Language (XPath). or from class information in an assembly.0 (Second Edition). XML.0. XSL consists of languages for transforming XML documents (XPath and XSLT) and an XML vocabulary for specifying formatting semantics. XSD is used to defined classes that are in turn used to create instances of XML documents which conform to the schema. See the document Extensible Markup Language (XML) 1. XSLT (eXtensible Stylesheet Language Transformation)²A language for transforming XML documents into other XML documents based of a set of well-defined rules. and SOAP. XML Schema²A description of the structure of an XML document. This tool can also generate runtime classes. XSD (XML Schema Definition)²A language used to describe the structure of an XML document. from an XSD schema file.exe) used to generate XML schemas (XSD files) from XDR and XML files. data and functionality) to other Web-based applications (i. XPath (XML Path Language)²A language that uses path expressions to specify the locations of structures and data within an XML document. and relative position.e. See the document XML Pointer Language (XPointer). or DataSet classes. attribute values.e.0.

NET IDE. SQL Server 9).XQL (XML Query Language)²A query language used to extract data from XML documents.NET languages to be used for writing stored procedures.a.NET and the CLR. See the document XML Query Language (XQL). XQL uses XML as a data model and is very similar to the pattern matching semantics of XSL. allowing .k. Y Yukon²The code name for the release of Microsoft SQL Server 2003 (a. v . Yukon will include full support for ADO. Yukon offers a tighter integration with both the .NET Framework and the Visual Studio ..