SlideShare a Scribd company logo
Smart Client application
Development
Using
Presented by:
Tamajit Chakraborty,
Computer Science & Engineering ,
6th semester,
Roll 09
Stuff we’ll talk about…
client model
Windows Forms
Code Access Security
Smart Device Programmability
Office System 2003
Visual Studio Tools for Office
The Client Model
Traditional Rich Client
 Uncompromised
user experience
 Flexible offline operation & storage
 Strong integration with client-side APIs
(Application programming interface)
 Great developer tools support
 Serious security issues, viruses, etc.
Traditional Web Client
 Broad desktop reach
 Easy administration
 Impaired or frustrating user experience
 No offline operation or storage
 Poor integration with client-side APIs
 DHTML / scripting tools non-existent
.NET Framework Smart Client
To the metal performance
 GDI(Graphics Device Interface)+
& DirectX graphics
 Direct Win32 & COM as needed
“Real time” (study of hardware and
software systems) interactivity
Friction free deployment & versioning
 Launch app from a URL
 Embed control in a web page
Safe and secure app execution
 Code access security
Automatic online / offline support
 Application updater component
Windows Forms
The .NET Framework Smart Client
Operating System
Common Language Runtime (CLR)
Base Class Libraries (BCL)
.NET and XML
ASP.NET
Web Forms Web Services
Windows
Forms
Common Language Specification
Visual
Basic C# J# …
VisualStudio.NET
C++
Windows Forms
The .NET Framework Smart Client
Smart client is a term describing an
application environment which:
Delivers applications over a web HTTP
connection
Does not require installation (or provide
automated installation and updates)
Automatically updates without user action
Has the look and feel of desktop
applications
More user friendly.
Issues of Code Security
The enemy is among us – no perimeters
Innocent but trusted code often plays host to
malicious mobile code
Malicious code can do anything that the user
has permissions to do
The user will always make the wrong security
decision
LIBRARY
Only people
with a
membership
card can use
books.
Code Security in Pictures
Security
Policy
ZYX
Y, would you get a
book for me?
Z, would you get a
book for X?
I would like to
check out a book
Are you and all who will handle this book members?
Shared
Library
Luring
attack
Untrusted
code
Stack
Walk
Security
Demand
Call
Chain
MEMBER
card
Evidence
MEMBER
card
MEMBER
card
Are you and all who will handle this book members?
LIBRARY
Only those
who have a
member card
can check out
a book.
ZYX
Y, would you get a
book for me?
Z, would you get a
book for X?
I would like to
check out a book
X is not a
member,
but I vouch
for him.
Stack
Modifier:
Assert() I don’t
want to be
responsibl
e – won’t
pass
books
promoting
violence!
Stack
Modifier:
Deny()
I will only
pass
books
printed
after 1980
Stack
Modifier:
PermitOnly()
Code Security in Pictures
Code Access Security
All Code in Call Chain is Evaluated
MYAPP (INTRANET)
. . . .
myComponent.ReadSetting(key);
. . . .
MYCOMPONENT (LOCALMACHINE)
. . . .
Stream fileStream = FileStream.Open(“settings.xml”);
. . . .
Calls
Got Permission?
Got Permission?
Exception
Calls
FRAMEWORK
public FileStream (string name) {
FileIOPermission fp = new FileIOPermission(name)
fp.Demand()
. . . .
}


Code Access Security
Stack Walk Stopped by Assert
MYAPP (INTRANET)
. . . .
myComponent.ReadSetting(key);
. . . .
MYCOMPONENT (LOCALMACHINE)
. . . .
FileIOPermission fp = new FileIOPermission
(FileIOPermissionAccess.Read, “settings.xml”);
fp.Assert();
Stream fileStream = FileStream.Open(“settings.xml”);
Calls
Got Permission?
Calls
FRAMEWORK
public FileStream (string name) {
FileIOPermission fp = new
FileIOPermission(name)
fp.Demand()
. . . .
}
 Returns
Returns
Device Programmability
Broad Reach vs. Smart Device
ASP.NET Mobile
Controls
Mobile Web
Browser
Remote Web Pages
Device Operating System
Smart Device
Programmability
.NET Compact
Framework
Local Code
Smart client
Smart Device Programmability
Remote Debugging
Same user experience as desktop
 Compile application for device
 Automatically deploys to selected device
 Output Window used for deployment messages
Supported features include
 On-device debugging
 Breakpoints
 Multi-language debugging
 Call Stack, Watch windows
Smart Device Programmability
SQL Server™ Windows® CE Edition 2.0
On-device data engine for Windows CE-
powered devices
Rich replication and synchronization with SQL
Server
Designed for high performance in resource-
constrained environment
Visual Studio Tools for Office
New Projects Types for VS.NET
Power and richness of the Office System
 “Code behind” for Word & Excel 2003
 Secure auto-deployment of .NET application code
VS.NET developer productivity
 Real languages – Visual Basic .NET and Visual C#
 IntelliSense, code outlining, dynamic help, etc.
 Advanced debugging environment
 Visual designers for WinForms, XML, data, etc.
 Power of the .NET Framework and web services
Visual Studio Tools can be downloaded from:
http://msdn.microsoft.com/en-us/vstudio
Advantage
“Friction Free” Deployment
No “installation” necessary – just run it
 Code downloads on-demand from any web server
 Saved in cache and dynamically updated
Copy to a folder and delete when done
 No registry entries or other dependencies
Windows Installer technology
 Self repairing installations, rollback, signing
Useful Resources
http://en.wikipedia.org/wiki/.NET_Framework
http://en.wikipedia.org/wiki/Smart_client
http://www.windowsforms.net
 TaskVision, sample code, forum, articles, etc.
Mobility and the .NET Compact Framework
 http://msdn.microsoft.com/mobility
http://msdn.microsoft.com/office
 Visual Studio Tools for Office, etc.
http://msdn.microsoft.com/community
 Hundreds of active third party communities
http://msdn.microsoft.com/newsgroups
 dotnet.framework.windowsforms
 vsnet.tools.office
© 2013 TAMAJIT.
THANK YOU
Any questions?

More Related Content

Viewers also liked

Database Normalization
Database NormalizationDatabase Normalization
Database Normalization
Rathan Raj
 
Entity relationship diagram - Concept on normalization
Entity relationship diagram - Concept on normalizationEntity relationship diagram - Concept on normalization
Entity relationship diagram - Concept on normalization
Satya Pal
 
Normalization
NormalizationNormalization
Normalization
Salman Memon
 
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFDatabase Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Oum Saokosal
 
DBMS - Normalization
DBMS - NormalizationDBMS - Normalization
DBMS - Normalization
Jitendra Tomar
 

Viewers also liked (7)

Functional dependency
Functional dependencyFunctional dependency
Functional dependency
 
Database Normalization
Database NormalizationDatabase Normalization
Database Normalization
 
Entity relationship diagram - Concept on normalization
Entity relationship diagram - Concept on normalizationEntity relationship diagram - Concept on normalization
Entity relationship diagram - Concept on normalization
 
Normalization
NormalizationNormalization
Normalization
 
Databases: Normalisation
Databases: NormalisationDatabases: Normalisation
Databases: Normalisation
 
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NFDatabase Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
Database Normalization 1NF, 2NF, 3NF, BCNF, 4NF, 5NF
 
DBMS - Normalization
DBMS - NormalizationDBMS - Normalization
DBMS - Normalization
 

Similar to dot net smart_client_development

Mobile development
Mobile developmentMobile development
Mobile development
Sayed Ahmed
 
Dload mobile development
Dload mobile developmentDload mobile development
Dload mobile development
Sayed Ahmed
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
MecklerMedia
 
Microsoft IT Academy Summit 2011
Microsoft IT Academy Summit 2011Microsoft IT Academy Summit 2011
Microsoft IT Academy Summit 2011
Lee Stott
 
Windows Embedded in the Real World
Windows Embedded in the Real WorldWindows Embedded in the Real World
Windows Embedded in the Real World
ukdpe
 
The Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdfThe Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdf
lior mazor
 
Building frameworks: from concept to completion
Building frameworks: from concept to completionBuilding frameworks: from concept to completion
Building frameworks: from concept to completion
Ruben Goncalves
 
Windows developer program for IoT
Windows developer program for IoTWindows developer program for IoT
Windows developer program for IoT
Mirco Vanini
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
Alexander Benoit
 
Dev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT SecurityDev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT Security
Mario Heiderich
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
Mirco Vanini
 
Building your Own Mobile Enterprise Application: It’s Not as Hard as You Migh...
Building your Own Mobile Enterprise Application: It’s Not as Hard as You Migh...Building your Own Mobile Enterprise Application: It’s Not as Hard as You Migh...
Building your Own Mobile Enterprise Application: It’s Not as Hard as You Migh...Jason Conger
 
201500912 Hello Windows 10
201500912 Hello Windows 10201500912 Hello Windows 10
201500912 Hello Windows 10
영욱 김
 
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
Caleb Jenkins
 
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Codemotion Tel Aviv
 
Mobile security
Mobile securityMobile security
Mobile security
Stefaan
 
Internet of things at the Edge with Azure IoT Edge by sonujose
Internet of things at the Edge with Azure IoT Edge by sonujoseInternet of things at the Edge with Azure IoT Edge by sonujose
Internet of things at the Edge with Azure IoT Edge by sonujose
Sonu Jose
 
Nakov - .NET Framework Overview - English
Nakov - .NET Framework Overview - EnglishNakov - .NET Framework Overview - English
Nakov - .NET Framework Overview - EnglishSvetlin Nakov
 
Android Programming made easy
Android Programming made easyAndroid Programming made easy
Android Programming made easy
Lars Vogel
 

Similar to dot net smart_client_development (20)

Mobile development
Mobile developmentMobile development
Mobile development
 
Dload mobile development
Dload mobile developmentDload mobile development
Dload mobile development
 
From Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy DevicesFrom Bitcoin Hardware Wallets to Personal Privacy Devices
From Bitcoin Hardware Wallets to Personal Privacy Devices
 
Microsoft IT Academy Summit 2011
Microsoft IT Academy Summit 2011Microsoft IT Academy Summit 2011
Microsoft IT Academy Summit 2011
 
Windows Embedded in the Real World
Windows Embedded in the Real WorldWindows Embedded in the Real World
Windows Embedded in the Real World
 
The Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdfThe Power of Malware Analysis and Development.pdf
The Power of Malware Analysis and Development.pdf
 
Building frameworks: from concept to completion
Building frameworks: from concept to completionBuilding frameworks: from concept to completion
Building frameworks: from concept to completion
 
Windows developer program for IoT
Windows developer program for IoTWindows developer program for IoT
Windows developer program for IoT
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Dev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT SecurityDev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT Security
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
Building your Own Mobile Enterprise Application: It’s Not as Hard as You Migh...
Building your Own Mobile Enterprise Application: It’s Not as Hard as You Migh...Building your Own Mobile Enterprise Application: It’s Not as Hard as You Migh...
Building your Own Mobile Enterprise Application: It’s Not as Hard as You Migh...
 
201500912 Hello Windows 10
201500912 Hello Windows 10201500912 Hello Windows 10
201500912 Hello Windows 10
 
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!10 Reasons Your Software Sucks 2014 - Tax Day Edition!
10 Reasons Your Software Sucks 2014 - Tax Day Edition!
 
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...Can we build an Azure IoT controlled device in less than 40 minutes that cost...
Can we build an Azure IoT controlled device in less than 40 minutes that cost...
 
CFInterop
CFInteropCFInterop
CFInterop
 
Mobile security
Mobile securityMobile security
Mobile security
 
Internet of things at the Edge with Azure IoT Edge by sonujose
Internet of things at the Edge with Azure IoT Edge by sonujoseInternet of things at the Edge with Azure IoT Edge by sonujose
Internet of things at the Edge with Azure IoT Edge by sonujose
 
Nakov - .NET Framework Overview - English
Nakov - .NET Framework Overview - EnglishNakov - .NET Framework Overview - English
Nakov - .NET Framework Overview - English
 
Android Programming made easy
Android Programming made easyAndroid Programming made easy
Android Programming made easy
 

Recently uploaded

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
amberjdewit93
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
datarid22
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 

Recently uploaded (20)

How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
 
kitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptxkitab khulasah nurul yaqin jilid 1 - 2.pptx
kitab khulasah nurul yaqin jilid 1 - 2.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 

dot net smart_client_development

  • 1. Smart Client application Development Using Presented by: Tamajit Chakraborty, Computer Science & Engineering , 6th semester, Roll 09
  • 2. Stuff we’ll talk about… client model Windows Forms Code Access Security Smart Device Programmability Office System 2003 Visual Studio Tools for Office
  • 3. The Client Model Traditional Rich Client  Uncompromised user experience  Flexible offline operation & storage  Strong integration with client-side APIs (Application programming interface)  Great developer tools support  Serious security issues, viruses, etc. Traditional Web Client  Broad desktop reach  Easy administration  Impaired or frustrating user experience  No offline operation or storage  Poor integration with client-side APIs  DHTML / scripting tools non-existent .NET Framework Smart Client To the metal performance  GDI(Graphics Device Interface)+ & DirectX graphics  Direct Win32 & COM as needed “Real time” (study of hardware and software systems) interactivity Friction free deployment & versioning  Launch app from a URL  Embed control in a web page Safe and secure app execution  Code access security Automatic online / offline support  Application updater component
  • 4. Windows Forms The .NET Framework Smart Client Operating System Common Language Runtime (CLR) Base Class Libraries (BCL) .NET and XML ASP.NET Web Forms Web Services Windows Forms Common Language Specification Visual Basic C# J# … VisualStudio.NET C++
  • 5. Windows Forms The .NET Framework Smart Client Smart client is a term describing an application environment which: Delivers applications over a web HTTP connection Does not require installation (or provide automated installation and updates) Automatically updates without user action Has the look and feel of desktop applications More user friendly.
  • 6. Issues of Code Security The enemy is among us – no perimeters Innocent but trusted code often plays host to malicious mobile code Malicious code can do anything that the user has permissions to do The user will always make the wrong security decision
  • 7. LIBRARY Only people with a membership card can use books. Code Security in Pictures Security Policy ZYX Y, would you get a book for me? Z, would you get a book for X? I would like to check out a book Are you and all who will handle this book members? Shared Library Luring attack Untrusted code Stack Walk Security Demand Call Chain MEMBER card Evidence MEMBER card MEMBER card
  • 8. Are you and all who will handle this book members? LIBRARY Only those who have a member card can check out a book. ZYX Y, would you get a book for me? Z, would you get a book for X? I would like to check out a book X is not a member, but I vouch for him. Stack Modifier: Assert() I don’t want to be responsibl e – won’t pass books promoting violence! Stack Modifier: Deny() I will only pass books printed after 1980 Stack Modifier: PermitOnly() Code Security in Pictures
  • 9. Code Access Security All Code in Call Chain is Evaluated MYAPP (INTRANET) . . . . myComponent.ReadSetting(key); . . . . MYCOMPONENT (LOCALMACHINE) . . . . Stream fileStream = FileStream.Open(“settings.xml”); . . . . Calls Got Permission? Got Permission? Exception Calls FRAMEWORK public FileStream (string name) { FileIOPermission fp = new FileIOPermission(name) fp.Demand() . . . . }  
  • 10. Code Access Security Stack Walk Stopped by Assert MYAPP (INTRANET) . . . . myComponent.ReadSetting(key); . . . . MYCOMPONENT (LOCALMACHINE) . . . . FileIOPermission fp = new FileIOPermission (FileIOPermissionAccess.Read, “settings.xml”); fp.Assert(); Stream fileStream = FileStream.Open(“settings.xml”); Calls Got Permission? Calls FRAMEWORK public FileStream (string name) { FileIOPermission fp = new FileIOPermission(name) fp.Demand() . . . . }  Returns Returns
  • 11. Device Programmability Broad Reach vs. Smart Device ASP.NET Mobile Controls Mobile Web Browser Remote Web Pages Device Operating System Smart Device Programmability .NET Compact Framework Local Code Smart client
  • 12. Smart Device Programmability Remote Debugging Same user experience as desktop  Compile application for device  Automatically deploys to selected device  Output Window used for deployment messages Supported features include  On-device debugging  Breakpoints  Multi-language debugging  Call Stack, Watch windows
  • 13. Smart Device Programmability SQL Server™ Windows® CE Edition 2.0 On-device data engine for Windows CE- powered devices Rich replication and synchronization with SQL Server Designed for high performance in resource- constrained environment
  • 14. Visual Studio Tools for Office New Projects Types for VS.NET Power and richness of the Office System  “Code behind” for Word & Excel 2003  Secure auto-deployment of .NET application code VS.NET developer productivity  Real languages – Visual Basic .NET and Visual C#  IntelliSense, code outlining, dynamic help, etc.  Advanced debugging environment  Visual designers for WinForms, XML, data, etc.  Power of the .NET Framework and web services Visual Studio Tools can be downloaded from: http://msdn.microsoft.com/en-us/vstudio
  • 15. Advantage “Friction Free” Deployment No “installation” necessary – just run it  Code downloads on-demand from any web server  Saved in cache and dynamically updated Copy to a folder and delete when done  No registry entries or other dependencies Windows Installer technology  Self repairing installations, rollback, signing
  • 16. Useful Resources http://en.wikipedia.org/wiki/.NET_Framework http://en.wikipedia.org/wiki/Smart_client http://www.windowsforms.net  TaskVision, sample code, forum, articles, etc. Mobility and the .NET Compact Framework  http://msdn.microsoft.com/mobility http://msdn.microsoft.com/office  Visual Studio Tools for Office, etc. http://msdn.microsoft.com/community  Hundreds of active third party communities http://msdn.microsoft.com/newsgroups  dotnet.framework.windowsforms  vsnet.tools.office
  • 17. © 2013 TAMAJIT. THANK YOU Any questions?