David Staheli discusses approaches Microsoft is taking to plugin development, sharing experiences in reusing code across plugins for different IDEs, with demos of plugins in Eclipse, IntelliJ, and VS.
Felienne Hermans presents various algorithms that outlining the power of Excel, showing that spreadsheets are fit for TDD and rapid prototyping.
The presenters introduce CheckCell, an Excel add-on used to identify cells that have an unusually high impact on the spreadsheet’s computations.
Matthew Moloney discusses using F# and .NET inside Excel, demonstrating doing big data, cloud computing, using GPGPU and compiling F# Excel UDFs.
Joel Semeniuk shares some of the lessons he learned managing development teams, how he got into Kanban and why its principles are helpful.
David Starr demoes Pex –a parameterized white box unit test tool- and Moles –an isolation framework-, two .NET tools useful for test-first development.
John Slaby and Jezz Santos explain how Raytheon has created Factories-in-the-Small useful to rapidly build new tooling such as the Pattern Automation Toolkit developed in cooperation with Microsoft.
David Starr presents some of the tools in Visual Studio Ultimate 2010 helpful for building an application’s architecture: Architecture Explorer, Dependency Graphs, UML Modeling, and Layer Diagrams.
Ian Goodsell presents the methodology for creating Eclipse and Visual Studio-based toolkits, and introduce Visual Studio Pattern Automation Toolkit, a toolkit for toolkit developers.
Tim Wagner discusses how the Visual Studio team at Microsoft uses customer feedback to improve the development process, testing and productivity of a 50 MLOC product.
Giles Davies and Richard Erwin explain how to work in a mixed development environment, .NET and Java, by using TFS to manage the projects and using Visual Studio and Eclipse as IDEs.
Ken Jones provides a framework for utilizing Visual Studio Team System, (VSTS), to support a development team and build better applications.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Increase security on compromised platforms with Intel® SGX.
An Intel technology for application developers who are seeking to protect select code and data from disclosure or modification.
A Developer’s Perspective.
Developers have long been constrained by the security capabilities that major platform providers have exposed for application development. How Bromium and wolfSSL employ Intel® SGX to create more secure, next-generation solutions.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.
Protect Application Code, Data, & Secrets from Attack.
Developers can partition their application into CPU hardened “enclaves” or protected areas of execution that increase security even on compromised platforms.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.