Dependency Injection is one of those terms that advanced programmers throw out with an expectation and assumption of full understanding on the part of the receiver. However, I constantly get asked by attendees, students, and clients to please recommend a good DI product and show them how to use it; and when I proceed to start talking about the subject, it becomes immediately apparent that many don't even know what they're asking about. It's easy to get infatuated by a cool buzz phrase, specially when you hear so many others using it. But to truly understand something you need to start by understanding the problem spaces that it is trying to solve. So let's bring you totally up to speed then. In this session, I'll explain dependency injection from concept to implementation, and use raw code samples to show you how it works and what problems it solves. Then I'll get into what a DI container is and some of the characteristics of the ones that are out there, including MEF. I'll end by showing you implementation examples in three different platforms.
Modeling web services using the HTTP API approach has become pretty much the standard approach. This also means that these APIs must be ready for all the security scenarios around identity and access control. These range from simple username/password and service to service communication, over enterprise integration to token based authentication and delegated authorization. In addition we also have to deal with different client types likes native desktop or mobile clients, browser clients and classic web applications. Dominick shows you how this all comes together.
After a 3-year long struggle, the IETF finally released the OAuth2 specification(s). While all the big players (like Google, Microsoft and Facebook) are already using it, more and more people want to follow. But there is big confusion about what OAuth2 really is, what its uses cases are and which problems it can actually solve. At the same time, also the security experts out there don’t really agree if OAuth2 is a complete failure, or not - or something in between. Dominick walks you through OAuth2, its use cases and pitfalls.
Inspiredby one of the Windows Azure gods (Wade Wegner), Maarten decided to order a homebrewing starter kit. Being a total cloud fanboy, he decided to hook thosedelicious creations to the cloud. Join Maarten and discover how you can connecta USB temperature sensor to Windows Azure to monitor brewing and fermentationtemperatures. He'll show you how to do distributed, social brewing in this funyet practical session on an interesting use case for the cloud: beer.
Everyone has that one idea that could be the next big thing. However, starting is the hardest part. This session will help attendees overcome this by providing practical and real world advice on how they can take a high level idea and turn it into reality focusing at both the product and technical level.
Forming the presentation around Lean Startup techniques, Ben will initially cover how to test the concept with potential users to gauge interest based on well-known techniques and his experience of building products and startups. Covering wireframes, initial customer acquisition and how to ask the right questions, attendees will understand the most effective ways to test their ideas.
Once you’ve found the next big thing, you’ll need to build it. Continuing the lean startup focus, Ben will describe the tools and techniques he has used to speed up time to market and identifying the right thing to build instead of just how to build it.
Once launched, it’s down to improvements. This section focuses on measuring users behaviour and engagement enabling you to identify areas that are working but more importantly the areas users are having problems.
By the end of the presentation, participants will have key insights into the startup world and how they can go from vision to reality. The aim is to give people the tools and techniques required to go off and implementing the ideas they already have at the back of their mind.