A slightly modified version of the slides used in a talk given first at #SWETUGG
More details at https://www.mrlacey.com/2020/02/modern-xaml-development-slides-and.html
This document contains HTML code that defines a frameset with two frames. The top frame loads a player from a radio website. The second frame loads a blog that discusses mental health topics. The frameset divides the page into a 60 pixel top section and a bottom section that takes up the rest of the page.
The document discusses the Block Element Modifier (BEM) methodology for organizing CSS and HTML code into independent reusable components. It provides examples of applying BEM to structure a logo block, its elements, and modifiers. BEM tools can be used to generate file structures for blocks and automatically import all CSS. The methodology aims to improve code reusability, separation of concerns, and enable specialist work between developers.
The document provides an overview of domain-specific languages (DSLs) and language-oriented programming. It discusses how DSLs are specialized computer languages for a particular domain and provides examples of DSLs. It also describes how language-oriented programming uses DSLs to define programming abstractions and implementations through language tools and workbenches. Finally, it outlines how a DSL for object-relational mapping was developed in PHP using a lexer, parser, and Eclipse integration.
This document discusses the creation of an AIR application called IketeruGourmet. It describes preparing files and folders for the application, including icons, library files, and source files. It also summarizes the contents of the application.xml file which describes the core properties of the AIR application. The main parts of the user interface are built in the IketeruGourmet.mxml file using the WindowedApplication component.
In web app development, the Microservices architecture and atomic design software development process can increase development efficiency.
When use these technologies, using tools also needs such as the Postman, the Podman, the Pixlr X, the Method draw, and the Swagger editor, Visual Studio and Visual Studio Code.
This presentation explain the process that you use these tools.
This document contains an advertisement for an insane $50 offer for shopping at Sam's Club. The document includes images that are links to opt-in, view creative, or unsubscribe pages. The purpose is to promote a $50 shopping offer and provide options to the reader to engage with the marketing message or unsubscribe from future messages.
This document appears to contain code snippets and strings related to sending automated emails. It includes references to schemas for configuring email settings like SMTP server details, authentication, and SSL usage. It also includes code for variables, functions, and objects related to string handling, variables, errors and exceptions in VBA/VBScript.
Web Technology Lab files with practicalNitesh Dubey
The document describes several experiments using HTML, CSS, JavaScript, Java, and SQL to develop web applications.
Experiment 1 involves creating a CV using HTML and JavaScript and displaying it on different websites. Experiment 2 creates a student details form in HTML that sends data to a database.
Experiment 3 uses JavaScript to display browser information on a web page. Experiment 4 develops a calculator application using JavaScript.
Experiment 5 defines document type definitions and cascading style sheets to style an XML document about books.
Experiment 6 connects to a database using JDBC and SQL. It retrieves and updates data, designing a simple servlet to query a book database.
This document contains HTML code that defines a frameset with two frames. The top frame loads a player from a radio website. The second frame loads a blog that discusses mental health topics. The frameset divides the page into a 60 pixel top section and a bottom section that takes up the rest of the page.
The document discusses the Block Element Modifier (BEM) methodology for organizing CSS and HTML code into independent reusable components. It provides examples of applying BEM to structure a logo block, its elements, and modifiers. BEM tools can be used to generate file structures for blocks and automatically import all CSS. The methodology aims to improve code reusability, separation of concerns, and enable specialist work between developers.
The document provides an overview of domain-specific languages (DSLs) and language-oriented programming. It discusses how DSLs are specialized computer languages for a particular domain and provides examples of DSLs. It also describes how language-oriented programming uses DSLs to define programming abstractions and implementations through language tools and workbenches. Finally, it outlines how a DSL for object-relational mapping was developed in PHP using a lexer, parser, and Eclipse integration.
This document discusses the creation of an AIR application called IketeruGourmet. It describes preparing files and folders for the application, including icons, library files, and source files. It also summarizes the contents of the application.xml file which describes the core properties of the AIR application. The main parts of the user interface are built in the IketeruGourmet.mxml file using the WindowedApplication component.
In web app development, the Microservices architecture and atomic design software development process can increase development efficiency.
When use these technologies, using tools also needs such as the Postman, the Podman, the Pixlr X, the Method draw, and the Swagger editor, Visual Studio and Visual Studio Code.
This presentation explain the process that you use these tools.
This document contains an advertisement for an insane $50 offer for shopping at Sam's Club. The document includes images that are links to opt-in, view creative, or unsubscribe pages. The purpose is to promote a $50 shopping offer and provide options to the reader to engage with the marketing message or unsubscribe from future messages.
This document appears to contain code snippets and strings related to sending automated emails. It includes references to schemas for configuring email settings like SMTP server details, authentication, and SSL usage. It also includes code for variables, functions, and objects related to string handling, variables, errors and exceptions in VBA/VBScript.
Web Technology Lab files with practicalNitesh Dubey
The document describes several experiments using HTML, CSS, JavaScript, Java, and SQL to develop web applications.
Experiment 1 involves creating a CV using HTML and JavaScript and displaying it on different websites. Experiment 2 creates a student details form in HTML that sends data to a database.
Experiment 3 uses JavaScript to display browser information on a web page. Experiment 4 develops a calculator application using JavaScript.
Experiment 5 defines document type definitions and cascading style sheets to style an XML document about books.
Experiment 6 connects to a database using JDBC and SQL. It retrieves and updates data, designing a simple servlet to query a book database.
Bootstrap is a free and open-source front-end framework for faster and easier web development. It includes HTML and CSS templates for common components like navigation bars, image carousels, alerts and more. Bootstrap also uses a responsive 12-column grid system and provides various utility classes for typography, spacing, sizing and more. Some key Bootstrap elements include containers, grids, images, dropdowns, navbars and utilities for layout, formatting and styling content.
Class 4 handout two column layout w mobile web designErin M. Kidwell
The document discusses building a two-column website layout using HTML and CSS, and making it responsive for mobile devices. It includes code for the HTML page structure with two columns, content, and navigation, as well as CSS code for styling. It then covers adding CSS media queries to modify the layout and styles at smaller screen sizes to optimize the design for mobile.
Zero to Sixty: AWS Elastic Beanstalk (DMG204) | AWS re:Invent 2013Amazon Web Services
AWS Elastic Beanstalk provides an easy way for you to quickly deploy and manage applications in the AWS cloud. In this Zero to Sixty session, accelerate your use of Elastic Beanstalk by learning how Nike and VTEX use several of its most powerful features. Through interactive demos and code samples for both Windows and Linux, this session teaches you how to achieve deployments with zero downtime, how to easily enable or disable application functionality via feature flags, and how to customize your Elastic Beanstalk environments with extensions. Demos and code samples are available to all session attendees.
Are you new to Elastic Beanstalk? Get up to speed for this session by first completing the 60-minute Fundamentals of Elastic Beanstalk lab in the Self Paced Lab Lounge.
This document discusses rapid prototyping tools and techniques using Compass and Middleman. It provides examples of how Compass can automate common CSS tasks like prefixing, clearfixes, image replacement, vertical rhythm, sprites, and more. This allows designers and developers to prototype faster without having to write repetitive CSS code.
Interactive Visualization With Bokeh (SF Python Meetup)Peter Wang
Bokeh is an interactive web visualization framework for Python, in the spirit of D3 but designed for non-Javascript programmers, and architected to be driven by server-side data and object model changes. Learn more about it and play with online demos at http://bokeh.pydata.org.
These slides are from a talk at San Francisco Python Meetup on September 10, 2014
The document discusses Jen and Tim's web design studio, which focuses on design, understanding different types of users, and providing relevant answers now. It mentions technologies they work with like XHTML, CSS, Ajax, and programming languages. The document emphasizes that usability and doing what works is important, and simple solutions are best.
Some slides on basic HTML, CSS, and WordPress and links to learning resources. Originally presented at the MSPWP user group meet up February 22, 2018 by Allyson Wehrs at the LuminFire office space.
Copy & Pest - A case-study on the clipboard, blind trust and invisible cross-...Mario Heiderich
The clipboard is one of the most commonly used tools across operating systems, window managers and devices. Pressing Ctrl-C and Ctrl-V has become so fundamentally important to productivity and usability that we cannot get rid of it anymore. We happily and often thoughtlessly copy things from one source and paste them into another. URLs into address-bars, lengthy commands into console windows, text segments into web editors and mail interfaces. And we never worry about security when doing so. Because what could possibly go wrong, right?
But have we ever asked ourselves what the clipboard content actually consists of? Do we really know what it contains? And are we aware of the consequences a thoughtless copy&paste interaction can have? Who else can control the contents of the clipboard? Is it really just us doing Ctrl-C or is there other forces in the realm who are able to infect what we believe to be clean, who can desecrate what we trust so blindly that we never question or observe it?
This talk is about the clipboard and the technical details behind it. How it works, what it really contains – and who can influence its complex range of contents. We will learn about a new breed of targeted attacks, including cross-application XSS from PDF, ODT, DOC and XPS that allow to steal website accounts faster than you can click, turn your excel sheet into a monster and learn about ways to smuggle creepy payload that is hidden from sight until it executes. Oh, and we’ll also see what can be done about that and what defensive measures we achieved to create so far.
Gotta code them all, a Pokémon and HTML5 love story!Home
How do you make an original GameBoy adventure available on mobile and desktop? In this session Bert explains how he made it happen using just HTML5 and Javascript, and which challenges he encountered. Who needs a girlfriend when there’s JavaScript?
This document contains the agenda for the JavaScript Lunch 6 event on June 12, 2008. The topics discussed will include Object Oriented JavaScript, jQuery, Reusable Codes, Packaging, DOM, Events, Ajax, and an overview of JavaScript language features and specifications over time. Example code is provided to demonstrate Array Comprehension, Let Scoping, and Destructuring assignments introduced in ECMAScript 5/JavaScript 1.7.
2 Roads to Redemption - Thoughts on XSS and SQLIAguestfdcb8a
This document discusses approaches to preventing SQL injection attacks (SQLIA) and cross-site scripting (XSS) vulnerabilities. It proposes using rich data types that define how data should be validated, sanitized, and serialized depending on its context and use. This could help frameworks automatically apply the proper validation and output encoding. However, such an approach needs good infrastructure support from frameworks and a comprehensive catalogue of data types to be practical. It may not be worth the effort compared to simpler approaches like those used in Django.
This document discusses factors that influence the evolution and adoption of programming languages like Scala. It argues that for a language to be evolutionarily stable, it needs to survive, be adopted by a user base that is more than 1%, and be attractive. Scala's main value proposition is its support for static metaprogramming, but it needs to improve concurrency support, reduce boilerplate code, and simplify its core to lower the learning curve. New developments like Dotty and Squid could help address current issues and support further language evolution.
NodeConf OneShot Budapest — Production Ready Node.js by Nuno JobNuno Job
A tale on building stable node.js services with a focus on performance. We will discuss what we learned over the years running node in production, and what tools and processes we use to help customers with large production node.js services find bottlenecks in their applications..
Dev Day 2019: Phillip Krenn – Aggregierte Logging PatternsDevDay Dresden
In verteilten Applikationen besteht immer der Bedarf Logs zu zentralisieren - sobald man mehr als ein paar Server oder Container hat, reichen SSH und cat, tail oder less nicht mehr aus. Das übliche Problem ist aber, wie man möglichst effizient zu einer zentralisierten oder aggregierten Log-Lösung kommt.
Dieser Vortrag stellt mehrere Ansätze und Patterns mit ihren Vor- und Nachteilen vor, so dass die Zuhörer den auswählen können, der am besten zu Ihrer Organisation passt:
* Parsen: Bestehende Logdaten können weiterverwendet werden und die relevanten Informationen werden per Regular Expression extrahiert.
* Senden: Mit einem geeigneten Log-Appender werden die Ereignisse direkt gesendet, ohne dass sie in einer Logdatei gespeichert werden müssen.
* Strukturieren: Ereignisse in einem strukturierten Format abspeichern, das dann direkt zentralisiert werden kann.
* Containerisieren: Das Logging mit Containern erfordert zusätzliche Automatismen, um effizient mit Logs arbeiten zu können.
* Orchestrieren: Auch wenn Dienste nur kurzfristig laufen und dynamisch verteilt werden, gibt mit Kubernetes Möglichkeiten den Überblick zu bewahren.
The document summarizes a presentation given by Bruce Kroeze and Chris Moffitt about Satchmo, an open source e-commerce framework built with Django. Some key points discussed include Satchmo's history and origins, unique features like custom shipping and payment modules, and how developers can leverage Satchmo's flexibility to build highly customized online stores. Examples are provided of how to create a custom shipping module to enable local pickup orders within a certain radius of a store.
This document provides a summary of HTML5 in Dutch. It discusses the history and evolution of HTML standards from HTML 2.0 to HTML5. It describes several new HTML5 features such as video, audio, canvas, and geolocation. It also covers HTML5 form elements, local storage, and CSS3 features like media queries and fonts. The document emphasizes using HTML5 elements and attributes for their semantic meaning to improve accessibility and search engine optimization.
This document provides an overview of 8 different techniques for creating artistic text effects with CSS3: 1) Using fancy web fonts, 2) Adding text shadows, 3) Creating rounded corners, 4) Applying box shadows, 5) Generating gradients, 6) Outlining text with strokes, 7) Clipping backgrounds to text, and 8) Adding reflections. For each technique, it provides a brief description and examples of the CSS code needed to implement the effect.
"Write Once, Run Everywhere" & Windows 10Matt Lacey
The document discusses the concept of "write once, run everywhere" in the context of developing Universal Windows Platform (UWP) apps for Windows 10. It notes that with UWP, a single app package can be built to run on all versions of Windows 10, whether on desktop, mobile or other devices. However, the "everywhere" and "anywhere" in slogans like this refers only to Windows 10, not other platforms like Android and iOS. True cross-platform development allowing an app to run everywhere requires building separate app packages for each desired platform.
Is your mobile app as secure as you think?Matt Lacey
Slides from talks at DunDDD and NDCLondon.
News stories of security vulnerabilities in mobile apps are becoming more common and their impact risks affecting more and more business and consumers. It doesn't have to be this way.
There are solutions to all the common security issues in mobile but sometimes we need to be made aware of what the issues are and how they can be prevented.
That's what I'll show in this talk. I'll draw on more than twelve years personal experience building apps for a wide variety of industries and the accumulated knowledge of the OWASP Mobile Security. We'll look at some examples of the common security mistakes apps on iOS, Android and Windows have made and then show practical examples of how to address the issues.
You'll leave this session wanting to review the security of your mobile apps but armed with the knowledge to make improvements and fix some security holes.
Bootstrap is a free and open-source front-end framework for faster and easier web development. It includes HTML and CSS templates for common components like navigation bars, image carousels, alerts and more. Bootstrap also uses a responsive 12-column grid system and provides various utility classes for typography, spacing, sizing and more. Some key Bootstrap elements include containers, grids, images, dropdowns, navbars and utilities for layout, formatting and styling content.
Class 4 handout two column layout w mobile web designErin M. Kidwell
The document discusses building a two-column website layout using HTML and CSS, and making it responsive for mobile devices. It includes code for the HTML page structure with two columns, content, and navigation, as well as CSS code for styling. It then covers adding CSS media queries to modify the layout and styles at smaller screen sizes to optimize the design for mobile.
Zero to Sixty: AWS Elastic Beanstalk (DMG204) | AWS re:Invent 2013Amazon Web Services
AWS Elastic Beanstalk provides an easy way for you to quickly deploy and manage applications in the AWS cloud. In this Zero to Sixty session, accelerate your use of Elastic Beanstalk by learning how Nike and VTEX use several of its most powerful features. Through interactive demos and code samples for both Windows and Linux, this session teaches you how to achieve deployments with zero downtime, how to easily enable or disable application functionality via feature flags, and how to customize your Elastic Beanstalk environments with extensions. Demos and code samples are available to all session attendees.
Are you new to Elastic Beanstalk? Get up to speed for this session by first completing the 60-minute Fundamentals of Elastic Beanstalk lab in the Self Paced Lab Lounge.
This document discusses rapid prototyping tools and techniques using Compass and Middleman. It provides examples of how Compass can automate common CSS tasks like prefixing, clearfixes, image replacement, vertical rhythm, sprites, and more. This allows designers and developers to prototype faster without having to write repetitive CSS code.
Interactive Visualization With Bokeh (SF Python Meetup)Peter Wang
Bokeh is an interactive web visualization framework for Python, in the spirit of D3 but designed for non-Javascript programmers, and architected to be driven by server-side data and object model changes. Learn more about it and play with online demos at http://bokeh.pydata.org.
These slides are from a talk at San Francisco Python Meetup on September 10, 2014
The document discusses Jen and Tim's web design studio, which focuses on design, understanding different types of users, and providing relevant answers now. It mentions technologies they work with like XHTML, CSS, Ajax, and programming languages. The document emphasizes that usability and doing what works is important, and simple solutions are best.
Some slides on basic HTML, CSS, and WordPress and links to learning resources. Originally presented at the MSPWP user group meet up February 22, 2018 by Allyson Wehrs at the LuminFire office space.
Copy & Pest - A case-study on the clipboard, blind trust and invisible cross-...Mario Heiderich
The clipboard is one of the most commonly used tools across operating systems, window managers and devices. Pressing Ctrl-C and Ctrl-V has become so fundamentally important to productivity and usability that we cannot get rid of it anymore. We happily and often thoughtlessly copy things from one source and paste them into another. URLs into address-bars, lengthy commands into console windows, text segments into web editors and mail interfaces. And we never worry about security when doing so. Because what could possibly go wrong, right?
But have we ever asked ourselves what the clipboard content actually consists of? Do we really know what it contains? And are we aware of the consequences a thoughtless copy&paste interaction can have? Who else can control the contents of the clipboard? Is it really just us doing Ctrl-C or is there other forces in the realm who are able to infect what we believe to be clean, who can desecrate what we trust so blindly that we never question or observe it?
This talk is about the clipboard and the technical details behind it. How it works, what it really contains – and who can influence its complex range of contents. We will learn about a new breed of targeted attacks, including cross-application XSS from PDF, ODT, DOC and XPS that allow to steal website accounts faster than you can click, turn your excel sheet into a monster and learn about ways to smuggle creepy payload that is hidden from sight until it executes. Oh, and we’ll also see what can be done about that and what defensive measures we achieved to create so far.
Gotta code them all, a Pokémon and HTML5 love story!Home
How do you make an original GameBoy adventure available on mobile and desktop? In this session Bert explains how he made it happen using just HTML5 and Javascript, and which challenges he encountered. Who needs a girlfriend when there’s JavaScript?
This document contains the agenda for the JavaScript Lunch 6 event on June 12, 2008. The topics discussed will include Object Oriented JavaScript, jQuery, Reusable Codes, Packaging, DOM, Events, Ajax, and an overview of JavaScript language features and specifications over time. Example code is provided to demonstrate Array Comprehension, Let Scoping, and Destructuring assignments introduced in ECMAScript 5/JavaScript 1.7.
2 Roads to Redemption - Thoughts on XSS and SQLIAguestfdcb8a
This document discusses approaches to preventing SQL injection attacks (SQLIA) and cross-site scripting (XSS) vulnerabilities. It proposes using rich data types that define how data should be validated, sanitized, and serialized depending on its context and use. This could help frameworks automatically apply the proper validation and output encoding. However, such an approach needs good infrastructure support from frameworks and a comprehensive catalogue of data types to be practical. It may not be worth the effort compared to simpler approaches like those used in Django.
This document discusses factors that influence the evolution and adoption of programming languages like Scala. It argues that for a language to be evolutionarily stable, it needs to survive, be adopted by a user base that is more than 1%, and be attractive. Scala's main value proposition is its support for static metaprogramming, but it needs to improve concurrency support, reduce boilerplate code, and simplify its core to lower the learning curve. New developments like Dotty and Squid could help address current issues and support further language evolution.
NodeConf OneShot Budapest — Production Ready Node.js by Nuno JobNuno Job
A tale on building stable node.js services with a focus on performance. We will discuss what we learned over the years running node in production, and what tools and processes we use to help customers with large production node.js services find bottlenecks in their applications..
Dev Day 2019: Phillip Krenn – Aggregierte Logging PatternsDevDay Dresden
In verteilten Applikationen besteht immer der Bedarf Logs zu zentralisieren - sobald man mehr als ein paar Server oder Container hat, reichen SSH und cat, tail oder less nicht mehr aus. Das übliche Problem ist aber, wie man möglichst effizient zu einer zentralisierten oder aggregierten Log-Lösung kommt.
Dieser Vortrag stellt mehrere Ansätze und Patterns mit ihren Vor- und Nachteilen vor, so dass die Zuhörer den auswählen können, der am besten zu Ihrer Organisation passt:
* Parsen: Bestehende Logdaten können weiterverwendet werden und die relevanten Informationen werden per Regular Expression extrahiert.
* Senden: Mit einem geeigneten Log-Appender werden die Ereignisse direkt gesendet, ohne dass sie in einer Logdatei gespeichert werden müssen.
* Strukturieren: Ereignisse in einem strukturierten Format abspeichern, das dann direkt zentralisiert werden kann.
* Containerisieren: Das Logging mit Containern erfordert zusätzliche Automatismen, um effizient mit Logs arbeiten zu können.
* Orchestrieren: Auch wenn Dienste nur kurzfristig laufen und dynamisch verteilt werden, gibt mit Kubernetes Möglichkeiten den Überblick zu bewahren.
The document summarizes a presentation given by Bruce Kroeze and Chris Moffitt about Satchmo, an open source e-commerce framework built with Django. Some key points discussed include Satchmo's history and origins, unique features like custom shipping and payment modules, and how developers can leverage Satchmo's flexibility to build highly customized online stores. Examples are provided of how to create a custom shipping module to enable local pickup orders within a certain radius of a store.
This document provides a summary of HTML5 in Dutch. It discusses the history and evolution of HTML standards from HTML 2.0 to HTML5. It describes several new HTML5 features such as video, audio, canvas, and geolocation. It also covers HTML5 form elements, local storage, and CSS3 features like media queries and fonts. The document emphasizes using HTML5 elements and attributes for their semantic meaning to improve accessibility and search engine optimization.
This document provides an overview of 8 different techniques for creating artistic text effects with CSS3: 1) Using fancy web fonts, 2) Adding text shadows, 3) Creating rounded corners, 4) Applying box shadows, 5) Generating gradients, 6) Outlining text with strokes, 7) Clipping backgrounds to text, and 8) Adding reflections. For each technique, it provides a brief description and examples of the CSS code needed to implement the effect.
Similar to Modern XAML Development - Matt Lacey (20)
"Write Once, Run Everywhere" & Windows 10Matt Lacey
The document discusses the concept of "write once, run everywhere" in the context of developing Universal Windows Platform (UWP) apps for Windows 10. It notes that with UWP, a single app package can be built to run on all versions of Windows 10, whether on desktop, mobile or other devices. However, the "everywhere" and "anywhere" in slogans like this refers only to Windows 10, not other platforms like Android and iOS. True cross-platform development allowing an app to run everywhere requires building separate app packages for each desired platform.
Is your mobile app as secure as you think?Matt Lacey
Slides from talks at DunDDD and NDCLondon.
News stories of security vulnerabilities in mobile apps are becoming more common and their impact risks affecting more and more business and consumers. It doesn't have to be this way.
There are solutions to all the common security issues in mobile but sometimes we need to be made aware of what the issues are and how they can be prevented.
That's what I'll show in this talk. I'll draw on more than twelve years personal experience building apps for a wide variety of industries and the accumulated knowledge of the OWASP Mobile Security. We'll look at some examples of the common security mistakes apps on iOS, Android and Windows have made and then show practical examples of how to address the issues.
You'll leave this session wanting to review the security of your mobile apps but armed with the knowledge to make improvements and fix some security holes.
Wpug vserv developer deck- march 2014 globalMatt Lacey
Laith Al-Janabi is the Developer Alliances Manager for Vserv.Mobi in Western Europe. Vserv.Mobi provides mobile app monetization solutions through their AudiencePro and AppWrapper products. Their products allow developers to generate revenue from their apps through ads and in-app purchases across emerging markets. Vserv.Mobi has over 280 million users across regions like Southeast Asia, Latin America, the Middle East, India, and Africa who view over 31 billion ad requests per month on their platform.
The document discusses various monetization strategies for mobile apps, including paid apps, freemium models, in-app purchases, subscriptions, advertising, and other indirect monetization approaches. It notes that only about 1/3 of apps are profitable and highlights factors like quality, engagement, retention, pricing, and platform that influence revenue. The document provides tips for experimenting with different monetization models and optimizing strategies like ads, trials, and cross-promotion.
The document discusses tips and best practices for developing mobile applications for Windows Phone, including:
- Key topics like Metro design, Visuals, Controls, .NET, MVVM pattern, app lifecycle, navigation, memory management, and localization.
- Async/await syntax in C# for asynchronous programming.
- Data binding and MVVM frameworks like MVVMLight, Caliburn.Micro, and MVVMCross.
- Tools for debugging performance issues like frame rate counters and memory profiling.
- The document provides resources for additional information on developing for Windows Phone.
Slides from presentation given at WPUG, DDD10 & DDDNorth about what's coming in WP8 and what developers can do now, before more information and the SDK are available.
This document discusses what every mobile developer needs to know. It emphasizes that mobile development requires understanding the user's context and minimizing inputs, outputs, and resources used. Developers must design within the constraints of mobile, such as smaller screens and unreliable connectivity, and focus on performance and quick response times given those limitations. The overarching message is that mobile development requires a different approach than traditional web development.
Awesome Windows Phone Development (Aberdeen)Matt Lacey
This document contains the agenda and notes for a presentation on Windows Phone development. The agenda includes recapping Windows Phone 7.0, discussing new features in Mango (7.1/7.5) such as multitasking, discussing the Metro design principles and language, and providing tips for Windows Phone app design and development. The presentation also briefly touches on monetization strategies and emphasizes that Windows Phone development is a business.
The document discusses the WP SDK v7.1.1, which focuses on optimizing apps for low memory devices like the Lumia 610. It provides code samples for detecting available memory and opting an app out of certain markets with low memory devices. The SDK also includes a new emulator but does not include a new OS or generic background agents.
This document discusses cross-platform mobile app development and proposes using HTML, CSS, and JavaScript with PhoneGap as a solution. PhoneGap allows apps written in web technologies to access device functionality like the camera, accelerometer, and geolocation across platforms like iOS, Android, Blackberry and more. Developers can use PhoneGap to get the platform tools, write their app in common web languages, and deploy it to multiple mobile operating systems.
This document provides an overview of Windows Phone 7 development. It discusses the Windows Phone 7 hardware capabilities, the tools and frameworks available for building applications, including Silverlight and XNA, the application publishing process, and Windows Phone design principles. It also demonstrates key Windows Phone 7 features like the application lifecycle, push notifications, and location awareness. The document encourages developers to learn more about Windows Phone 7 development through Microsoft and community resources.
This document discusses using HTML, JavaScript and the WebBrowser control to build Windows Phone 7 apps. It provides examples of loading and navigating URLs within the WebBrowser, and creating a back stack. While the WebBrowser allows interacting with websites, the document recommends considering alternatives and only using it for this purpose. It then introduces a cross-platform framework for building mobile apps with HTML, JavaScript and CSS that can access some native features and run on multiple platforms including Windows Phone 7. Some limitations are debugging across platforms and incomplete Windows Phone 7 support.
Introducing XNA for WP7
Rob Fonseca-Ensor discusses XNA, a game development framework for Windows Phone 7. XNA allows developers to create 2D and 3D games using a game loop model and includes APIs for graphics, input handling, and more. It is relatively portable across Xbox, PC, Zune and now WP7. The Content Pipeline is used to manage game assets. Input can be read from the GamePad, TouchPanel, and gestures. Components can encapsulate responsibilities in games to keep code organized as the game grows more complex.
Mobile Web 2.0 & MDBF (DDDSW - Grok Talk)Matt Lacey
The document discusses the evolution of mobile web and web 2.0. It notes that phones now have better browsers and faster connections, enabling more users to access the mobile web. Globally there are over 1 billion mobile web users, more than PCs and laptops combined. It emphasizes that the mobile web matters and its usage is increasing, with some sources predicting 50% of internet traffic coming from mobile devices in the coming years. The document also covers challenges like varying mobile device capabilities and introduces solutions like libraries and frameworks to help develop for the mobile web.
Mobile Web 2.0 (DDD Scotland - Grok Talk)Matt Lacey
This document discusses mobile web technologies and strategies for developing mobile web content. It covers topics like Web 2.0 principles for mobile, statistics on mobile internet usage, considerations for what constitutes "mobile" versus desktop, and tips for mobilizing websites. It also provides resources for mobile device detection and content adaptation.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
2. Plan Of Action
1. Quick history lesson
2. Look at tools
1. Now
2. Coming soon
3. WinForms
•Binary formats hard to
manage
•Hard to style
(owner-drawn
controls)
•Hard to decouple
presentation from logic
•Hard to compose and
WPF
•Text based formats
•Flexible styling
•MVVM & Binding
•Composition
fundamental
22. XAML is code
• Human and machine readable
• Tries to make life easier for developers
• Has some assumptions, restrictions, and constraints
• Highly structured (yet flexible)
• Offers multiple ways of doing things
• Different versions can be used in different places
• Supported by specific tooling
43. What did we cover today?
• XAML is not dead
• Microsoft are investing in tooling
• 3rd parties & the community are making improvements
• There’s lots to help you (think C#)