Demonstration Theater
Tuesday, May 14, 6:00 – 7:30pm
The Visual Studio Live! Demonstration Theater provides a great way to learn more about products and solutions offered by our sponsors during the Exhibitor Reception. Located in the Southeast Hall, near the exhibits, the demonstrations are easy to drop in on for a quick dose of interesting tech talk.
6:05 – 6:25 pm |
Managing .NET App Performance - Kirby Frugia, Engineering Manager, .NET & Matt Sneeden, Quality Assurance Developer
The goal of this session is to help you, as a developer, understand performance driven development. We'll identify some common performance problems in .NET web apps and help you understand how you can use New Relic to solve them. We'll do this by demonstrating a Code Kata, which is an exercise in programming designed to help you hone your skills through practice and repetition.
|
6:30 – 6:50 pm |
Asking spatial questions of your data using HTML5 and the ArcGIS API for Javascript - Ben Ramseth, Esri Instructor Technical Lead
If HTML5 is your choice for building web applications, then the ArcGIS API for JavaScript is your solution. The topic covered in this demo session will include using specific HTML5 technologies available in the ArcGIS API for JavaScript to ask questions of your data based on your location. |
6:55 – 7:15pm |
Consolidate Code Scanning in Visual Studio to Fix Software Vulnerabilities - Fred Pinkett, VP, Product Management, Security Innovation
Development organizations struggle with security - partially because it's not a priority, partially because the security organization pushes policies that don't map with software objectives and deliverables. The ability to identify and fix your vulnerabilities is critical in satisfying SDLC requirements, as well as security guidelines and compliance mandates. This presentation will show Microsoft's CAT.NET static analysis scanner inside Visual Studio, populated with guidance and fix scrips from Security Innovation's TeamMentor, allowing development teams to quickly execute scans, understand where their code is vulnerable and fix it within their IDE for a streamlined, repeatable process. | |