Windows and Windows Phone have a converged Live Tiles platform and development model. In Windows Phone 8.1 you’ll be able to do great new things with the Tiles Platform and this session is targeted at helping you understand several critical tiles topics. We talk about our converged WNS push platform and about migrating your tiles from a Windows Phone 8.0 app to a Windows Phone 8.1 app and how to best take advantage of the new Tile Templates and scenarios available to you using the converged model on Windows Phone 8.1.
Providing a scripting environment and language so that users can mod and extend a game is a traditional practice in the videogame industry, where C/C++ game engines like Unity allow you to use C# to create and script games. Providing a scripting environment allows users and designers to break out of the constraints of the game, modifying it and extending it beyond the intent of the original developers. What if non-gaming applications could also leverage a scripting environment to gain flexibility and power? With Mono's embedding API it's easy for any C/C++ application to add the power of C# and .NET to its arsenal.
In this talk we will go through the basics of how to embed Mono and run C# from a C/C++ bootstrapping application, its potential uses, as well as the problems and pitfalls that you will encounter along the way. There are many interesting things that you can do when you control the runtime, domain and assembly loader from native land, and we will look at some fun tricks that are possible, like dynamic UIs that you can script, extend and modify at runtime without ever restarting your app, or games where the users drive the content.
Из этого доклада вы узнаете, как за полчаса развернуть в облаке полноценный RESTful API, подружить его код с .NET и работать с данными практически с любого устройства, не заплатив при этом ни копейки. Речь пойдет, собственно, об использовании Azure Mobile Services Custom API с кодом на .NET на примере взаимодействия двух разных приложений (Win8 и WP8/Android).
Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system.
During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!