Developers need to see the overall design of their code to investigate issues, add new capabilities, on-board a new colleague, or improve the structure of their code. Code map is a tool in Visual Studio for doing just this. This video shows how code map can be used to visualize the design and architecture of a .NET application direct from code, highlighting some of the new features introduced in Visual Studio 2013 Update 3 and Visual Studio 2015.
Serving up content on the Internet is something our web sites do daily. But are we doing this in the fastest way possible? How are users in faraway countries experiencing our apps? Why do we have three webservers serving the same content over and over again? In this session, we'll explore the Windows Azure Content Delivery Network or CDN, a service which makes it easy to serve up blobs, videos and other content from servers close to our users. We'll explore simple file serving as well as some more advanced, dynamic edge caching scenarios.
Web ブラウザーやスマートフォン、タブレット、PC などさまざまなデバイスからパブリック/プライベート クラウド上に配置されるアプリケーションを開発するにあたり、制約事項などバランスを取りながら技術を選択することが求められています。 本セッションでは、デバイス ネイティブ アプリケーションと Web アプリケーションの特性の違いを確認し、マルチデバイスをターゲットとしたアプリケーション開発に活用できる技術について解説します。
Over the last years, many customers have had to deal with cyber attacks targeted at intellectual property. We have entered a new phase in which criminals unleash destructive attacks, rendering IT environments unusable and effectively halting business. Consumerization of IT and the cloud add inherent tension and security implications to this new reality. How can one deal with data that moves in and out of your datacenters, to unmanaged devices and cloud services not directly under your control? How can you create a cost efficient architecture and plan for prevention, detection, and recovery in a time where cloud and consumerization of IT are high on every CxO's agenda? The presenters of this session have been on the Targeted Attack frontline with enterprise customers over the last years. They explain the threats of targeted attacks and share an architecture model using a data classification model, as well as their field experiences and services you can leverage to deal with prevention, detection and recovery.