Posts

Showing posts from November, 2025

Bit By Bit: Microsoft Destroys Decades-Old Hierarchical Scoped Settings

  Microsoft Destroys Decades-Old Hierarchical Scoped Settings For over four decades, Microsoft built its empire on a foundation of consistency, reliability, end-user trust. There is an established hierarchical configuration model that has been in place for years and adopted by the entire software industry. The scenario is simple, a machine level (top) layer of settings meant to be applied consistently to all. This developer works with several clients, each with different requirements in their application, so without disturbing the configuration of any other project, he makes the adjustments to the solution layer. Now to add complexity but certainly a common situation, one project manager in this solution has his own requirements. The developer creates another configuration file with the new requirements. This is a perfect example of a typical large-scale project, not an edge case exception. If there is a setting in the lower level (project) that exists in a higher (machine) level...

Bit By Bit: Microsoft Destroys Decades-Old Hierarchical Scoped Settings

  Microsoft Destroys Decades-Old Hierarchical Scoped Settings For over four decades, Microsoft built its empire on a foundation of consistency, reliability, end-user trust. There is an established hierarchical configuration model that has been in place for years and adopted by the entire software industry. The scenario is simple, a machine level (top) layer of settings meant to be applied consistently to all. This developer works with several clients, each with different requirements in their application, so without disturbing the configuration of any other project, he makes the adjustments to the solution layer. Now to add complexity but certainly a common situation, one project manager in this solution has his own requirements. The developer creates another configuration file with the new requirements. This is a perfect example of a typical large-scale project, not an edge case exception. If there is a setting in the lower level (project) that exists in a higher (machine) level...

Bit By Bit: Microsoft Creates Training Wheels Disrespecting Experience Users

 Microsoft Implements Training Wheels 🛠️ When the Tool Fights the Technician Why Visual Studio 2026’s Schema Lockdown Is a Step Backward for Developers Who Know What They’re Doing I didn’t set out to break anything. I wasn’t trying to override the system, exploit a loophole, or hack around a limitation. I was trying to fix a broken feature—AI documentation suggestions triggered by /// comments—that used to work just fine. And when it failed, I did what any disciplined developer would do: I opened the settings file and tried to restore it manually. That’s when Visual Studio 2026 Insiders erased my configuration. No warning. No fallback. No grayed-out keys. Just silent deletion. 🧭 The Regression Nobody Asked For In previous versions, if you added an unsupported key to settings.json , Visual Studio would ignore it gracefully. It might gray it out in the UI, or skip it during parsing—but it wouldn’t punish you for trying. That behavior respected developers. It understood th...

Can Microsoft Windows User Interface Be Trusted? Their AI suggests that we may not.

            Performing a simple task in Windows GUI should be a straight forward task. However, lately simple and Windows are drifting farther apart than most users are aware of. So being a cautious and detail oriented Admin, I enlisted Copilot as a precaution.                My AI coding pal and I have crossed this path before during development of an application and I had some issues attempting this before. A common practice is to move users home and/or profile folders off the boot drive to keep it clean and lean.  I expected some secondary steps, but I was not expecting the answer I got from Copilot. Important note on AI: I have been working with AI on a forensics grade Windows Configuration application so the level of detail it provides me is not necessarily what a normal user should expect. I possess no special access, think of it as a friend that knows my capabilities and usual focus.

Popular posts from this blog

Handling backspace/delete with AJAX MaskedEditExtender in chrome

Ajax AutoCompleteExtender Page Method Magic

Can Microsoft Windows User Interface Be Trusted? Their AI suggests that we may not.