DevWeek 2013: Tuesday Sessions Overview

I just got back from DevWeek 2013 at the Barbican Centre in London.  I enjoyed all the sessions I attended and have documented a few key presentations below.


Tuesday Morning: Modelling and implementing hierarchies with SQL Server

Presenter

Session Overview

Bob’s session looked at support in SQL Server for hierarchical data, comparing and contrasting the methods of maintenance and query. He focussed on SQL Server’s hierarchyID data type and compared against adjacency model, nested set model, and XML storage and query.

Slides & Code Samples


Tuesday Afternoon (Session 1): The world of HTML5 and CSS3

Presenter

Session Overview

Laid back speaker Scott Allen looked at the benefits of using HTML 5 and CSS 3. He gave demonstrations of new features such as websockets, webworkers, animations, transitions, and SVG to demonstrate how to build rich applications with the latest standards.  A joy to watch!

Slides, References & Code Samples


Tuesday Afternoon (Session 2): Taking advantage of C# 5 async/await

Presenter

Session Overview

.NET 4 introduced the new ‘task’ abstraction, and C# 5 will take advantage of integrating this into the language via the async and await keywords. Furthermore, the new task abstraction promotes a new way of architecting asynchronous behaviour; in this talk we will explore how to take advantage of these new keywords and other new types and features being exposed in the next version of .NET to deliver far simpler asynchronous Windows UIs.

Hack Proofing Your Microsoft ASP.NET Web Forms and MVC Applications

Security is an afterthought with most developers. A common problem is that most web applications can be easily hacked. This presentation explores the most common attacks on web applications, how they work to exploit your app, and most importantly, how to protect against them. Techniques such as Cross Site Scripting, SQL Injection, Session Hijacking, and Cross Site Request Forgery will be covered. ASP.NET Web Forms and ASP.NET Model-View-Controller (MVC) will be covered, as both have pros and cons that will be explored. We will start with a ‘broken’ application and secure it throughout the presentation. Learn about the various tools, techniques, and libraries to help protect your applications!

Click here for article