What order are pages in a memory-mapped file flushed out to disk?
Say you create a memory-mapped file mapping and write data to it. In which order will the pages be flushed out to disk? Is it in the order the pages were written? Or are pages closer to the beginning...
View ArticleEven if your assembly language code doesn’t call any Windows APIs, you still...
Writing in assembly language doesn't absolve you from adhering to the software conventions. Certainly you have more flexibility in assembly language, but that doesn't give you freedom to do anything...
View ArticlePrecision questioning: The cynical description
Precision questioning is a technique used by some senior executives at Microsoft. Although precision questioning positions itself as a toolkit for critical thinking and problem solving, its use in...
View ArticleAsking for clear written documentation that Require trusted path for...
A customer had turned on the Require trusted path for credential entry policy (under Computer Configuration, Administrative Templates, Windows Components, Credential User Interface). They demanded...
View ArticleWhy is there a limit of 15 shell icon overlays?
There is a limit of fifteen shell icon overlays. Why fifteen? The value 15 came from the corresponding limit for image lists. The ImageList_SetOverlayImage function supports up to 15 image list...
View ArticleExpressing fire-and-forget coroutines more explicitly, -or- How to turn any...
Last time, we looked at how to mark a coroutine as fire-and-forget, meaning that the caller does not get any information about when the coroutine completes. This is fine as far as it goes, but it may...
View ArticleTurning anything into a fire-and-forget coroutine
Last time, we wrote a helper function for converting an awaitable into a winrt::fire_and_forget, as well as another helper function that takes a lambda that returns an awaitable, and which invokes the...
View ArticleVintage Computer Festival Pacific Northwest 2019
This upcoming weekend, the Vintage Computer Festival Pacific Northwest 2019 will take place at the Living Computers Museum+Labs in Seattle. The festival is included with admission to the museum. ($18...
View ArticleWhat does the N in nmake stand for?
The Visual Studio toolchain comes with a tool called nmake. It processes files in roughly the same way as the traditional Unix make tool. Why is it called nmake instead of just make? Rewind back to the...
View ArticleWhen do CoreDispatcher.RunAsync and ThreadPool.RunAsync actions complete?
The CoreDispatcher::RunAsync and ThreadPool::RunAsync methods take a delegate and schedule it to be invoked on the dispatcher thread or on a thread pool thread. These methods return an...
View ArticleHow do I wait for the completion of the delegate I passed to...
As we saw last time, The the CoreDispatcher::RunAsync and ThreadPool::RunAsync methods complete when the delegate returns, which is not the same as when the delegate completes. How can you wait...
View ArticleC++/WinRT envy: Bringing thread switching tasks to C# (UWP edition)
Last time, we developed a RunTaskAsync method to try to make it easier to switch threads in a task, but we saw that while it simplified some operations, it was still cumbersome because of the...
View ArticleC++/WinRT envy: Bringing thread switching tasks to C# (WPF and WinForms edition)
Last time, we brought ThreadSwitcher.ResumeForegroundAsync and ThreadSwitcher.ResumeBackgroundAsync to C# for UWP. Today, we’ll do the same for WPF and Windows Forms. It’ll be easier the second...
View ArticleOh no, it’s inspection time again
I recreate below a memo attached to the office doors of some occupants of the Microsoft RedWest campus fourteen years ago today. From: Reel Estate & Faculties Executive NotificationsSent: Friday,...
View ArticleOn the bogosity of speculation: Guessing the price of the original Surface
It appears that Windows 8 followed the teaser model: Show people a glimpse of the future, and then don’t mention it again until you have another big announcement. It happened in June 2011, when a brief...
View ArticleDubious security vulnerability: Code execution via LNK file
A security vulnerability report arrived that claimed to have achieved code execution via a shortcut (LNK) file. The report was somewhat convoluted, but it went something like this: Start with this...
View ArticleWhy do we need atomic operations on the 80386, if it doesn’t support...
The 80386 processor did not support symmetric multiprocessing, yet we discussed atomic operations when in our overview of the processor. If the processor doesn’t even support symmetric multiprocessing,...
View ArticleHow to compare two packed bitfields without having to unpack each field
Suppose you are packing multiple bitfields into a single integer. Let's say you have a 16-bit integer that you have packed three bitfields into: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 r g b Suppose you...
View ArticleMy initial frustration trying to configure our internal VoIP phones that were...
I remember when Microsoft made their initial internal roll-out of its VoIP phones. The VoIP phones were integrated with a desktop app which let you configure the phone, managed your telepresence, as...
View ArticleAlternate definitions for English words, as inferred from bug reports
Here are some terms that appear in bug reports. "Empty" means "There are a bunch of things here, but not the ones I wanted." "Blank" means "There are things, maybe." "The picture is wrong" can mean...
View Article