When we started ASP.NET Core we threw away a lot of the mistakes we made in the past. It turns out a lot of developers liked those mistakes and we've been bringing back features in a safe and security manner.Come see what we've added to ASP.NET 2.1 to support new and old scenarios that you requested
S207 - Blazor: Modern Web development with .NET and WebAssembly - Daniel RothClient-side web development has long been the sole domain of JavaScript. WebAssembly is poised to change that by opening up the web to the full ecosystem of languages, frameworks, and tools. Blazor is an experimental project to bring .NET to the Web via WebAssembly. In this session you'll see how Bl
Correcting Common Mistakes When Using Async/Await in .NET - Brandon MinnickI’m here to tell a scary story; one of inefficient code and unhandled exceptions. A story about a .NET developer who used async/await, but didn’t fully understand the framework. Their code started experiencing strange bugs. Their app size was strangely large. GASP!Don’t let this happen to you.
Don’t Make Squirrel BurgersYour manager comes to you and says “Hey, Joe. Let’s talk. I need to get a new system developed to keep track of our help desk calls. It needs to have a slick user-interface that is easy to navigate, it needs to be fast, and also we need integration with SAP.
Why you should use SQL CTEsLast week I was explaining to a junior analyst how CTEs (common table expressions) work. They’re persisted temporary data sets, that allow you to store a single query to go back to later in your script. They're underrated compared to the subquery, that seems to be what most analysts around me use.
The Illustrated TLS ConnectionIn this demonstration a client has connection to a server, negotiated a TLS 1.2 session, sent "ping", received "pong", and then terminated the session. Click below to begin exploring. This choice of version number (3.3 rather than 1.2) is due to TLS 1.0 being a minor revision of the SSL 3.
Generating IDs in C#, 'safely' and efficientlyRecently I needed to find an efficient algorithm for generating unique IDs in a highly concurrent and low latency component. After looking at several options I settled for the algorithm used by the Kestrel HTTP server.
The danger of TaskCompletionSource<T> classTaskCompletionSource<T> class is a very useful facility if you want to control the lifetime of a task manually. Here is a canonical example when TaskCompletionSourceis used for converting the event-based asynchronous code to the Task-based pattern:
What indexes should I create on a table?While designing a software system that involves a database, this question inevitably pops up in the minds of software developers.
Strategy Pattern – Head First Design Patterns – ep 1This series examines every design pattern in the book "Head First: Design Patterns". This time we look at Strategy Pattern.? Get the bookhttp://amzn.to/2iFtyAD? Mentioned: Sandi Metz – Nothing is Somethinghttps://youtu.be/OMPfEXIlTVE
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.