Code Camp II: The Return
October 16, 17 2004
Microsoft New England
201 Jones Rd.
Have you registered?
|300||Introduction to the .NET CLR and Internals||Confused by all the terms like CLR, CTS, BCL, FCL, CLI and the like? Want to know what they mean and what they do? Want to understand the basics of using the .NET Framework? Come to this presentation and Sam, who has been working with .NET for nearly five years, will present the basics that are applicable to any .NET language that you choose to use. In addition to de-mystifying the acronyms, Sam will cover topics like assemblies, JIT compiling, Reference versus Value Types, and Garbage Collection. In addition, insights into how to best utilize the .NET Framework in various scenarios including Interop will be presented||Sam Gentile||Presentation|
|300||Introduction to the .NET COM Interop||Managed code is wonderful but many companies have millions of lines of existing COM Interop. The good news is that .NET has extensive Interop facilities. The bad news is that Interop, in real world applications can be very hard. This session will provide an introduction to Runtime Callable Wrappers (RCW) and COM Callable Wrappers (CCW) and how to use them in your code.||Sam Gentile||Presentation|
|300||Introduction to Mobile Development with the Whidbey Compact Framework 2.0||You may have heard that developing for mobile devices such as PocketPCs and SmartPhones is possible with .NET. Not only is it possible, but the .NET Compact Framework actually makes it much easier than earlier methods such as eVC++ and eVB. The catch is that the Compact Framework 1.1, you are constrained to a small subset of framework. The good news, is that Whidbey’s Compact Framework 2.0 and SDE Tools provide not only much more of the framework but a first-class development platform for creating mobile applications. In this session, I will outline all the new features and we will see a bunch of cool demos.||Sam Gentile||Presentation|
|300||Introduction to Code Access Security||In unmanaged Win32 applications, the operating system authorized access to resources based solely on who was running the program. In today's highly distributed, component-oriented environment, you need a security model based on what a given piece of code, a component, is allowed to do. .NET allows you to configure permissions for components, and provide an evidence to prove that it has the right credentials to access a resource or perform some sensitive work. This talk will cover evidence, policy, permissions, and runtime enforcement (stalk walking, etc.) I will also show how to manage application security using the .Net configuration tool and programmatically.||Robert Hurlbut||Presentation|
|400||Writing Secure Windows Forms Applications||This talk will demonstrate coding techniques to make sure your Windows Forms application is secure. Topics covered will be isolated storage, code access security permissions, partially trusted design and development, and no-touch deployment security issues.||Robert Hurlbut||Presentation|
|300||Agile Development with .NET
Agile methodologies are rapidly gaining in popularity and have become increasingly important to understand. Much has been written and many tools exist today to assist with the adoption of Agile methods. This session will begin with an overview of the main tenets of Agile development. We'll then focus on some core development practices: effective unit testing and test-driven development, refactoring, implementing an automated build and achieving continuous integration, all within a .NET environment. Current tools such as NUnit, NAnt, CruiseControl.NET and others will be introduced. Brief mention of the Agile features coming in Visual Studio 2005 will be made. Throughout the session, I'll relate our experiences with these approaches and tools at Monster.com.
|300||Effective Development Practices in .NET||This interactive peer discussion will focus on development practices, ranging from design to coding and deployment. Topics may include, but will certainly not be limited to, successfully implementing development standards, code reviews, practices sharing, class reuse, code management, related tools, training and more. What’s worked for you and, equally important, what has not? Having trouble implementing a specific practice in your organization? Looking for tips on what tools might make your development life easier? This will be a great chance to pick the collective brains of other experienced .NET developers. The speaker will give examples of what methodologies and tools have worked, and which have failed, in practice at Monster.com.||Christopher
|300||Options for Coordinating a Distributed System||Today's solutions often involve communicating with other systems. Sometimes they are on the same machine (although different processes); sometimes they are on different machine, and sometimes they are even on different domains. Microsoft offers a variety of technologies to help with this - but not all technologies are created equal. This presentation will cover .Net Remoting, Web Services and Microsoft Message Queue (MSMQ); the pros and cons of each and re-enforce the technology with .Net code samples.||Kevin E. Ford||Presentation|
|300||Creating Dynamic UIs in WinForm Applications||With the .NET Framework, it’s quite easy to create a framework that allows a developer to change the look and feel of a UI without the need to alter any code. This session will cover the design and development of a CSS-like WinForms engine developed by the speaker, along with alternative approaches to WinForms UI design that can be used today (i.e. Xamlon - http://www.xamlon.com).||Jason Bock||Presentation|
|300||Asynchronous programming in .NET||Creating responsive applications requires using asynchronous techniques to perform work off of the UI thread. This session will cover timers, threads, the thread pool, synchronization techniques and a peak at what .NET 2.0 has to offer asynchronous programmers||Dan Golick||Presentation|
|200||Extracting Data Using .Net Regular Expressions||An introduction on regular expressions and the .net regular expressions classes. I will introduce regular expressions by walking through how they made it easy to extract data from a text credit report. I will also discuss the relevance of regular expressions when parsing HTML.||John Bastow||Presentation|
|300||Using Design Patterns in Software Development||
This session is for any programmer who believes there is a better, more
elegant solution to their most recent programming challenge! Design
patterns are recurring solutions to software design problems you find
time and again in real-world application development. While the topic of
design patterns can be vast this session will primarily focus on four
key patterns that most enterprise application developers can receive
benefit immediately after implementation.
Factory Method - (Creational Pattern) Creates an instance of several derived classes
Singleton - (Creational Pattern) A class of which only n instances can exist, typically 1
Command - (Behavioral Pattern) Encapsulate a command request as an object
Memento - (Behavioral Pattern) Capture and restore an object's internal state
|300||Developing as a non-admin||We have all heard we shouldn’t run as administrator on our computers. But, how do you develop software as a non-admin (i.e. normal/limited user)? It really is a lifestyle change. This interactive talk will discuss techniques and reasons for developing as a non-admin, as well as problems, solutions, and experiences developers have encountered as they have tried to develop software as a non-admin.||Robert Hurlbut||Chalk Talk|
|300||Patterns in C# Programming
What do the lock, using, foreach and unsafe keywords
actually do? Each one generates a pattern of IL code from a template, and then customizes it based on the context of its use. C# 2.0 continues this with patterns for generating Generic types, and custom Iterators. In this session, we'll explore Patterns in C#, with an eye to how to better understand how the C# language really works.
|Richard Hale Shaw
|300||Best and Worst Practices in C# Programming||
How efficient is lock? When should you use readonly
vs. const? Why is casting evil - and what do you do about it? (Answer: use as or is.) This session will enumerate a number of Best - and Worst Practices - for C# programmers, and show you solutions you can use right away.
|Richard Hale Shaw
|300||Pattern Mining with .NET||
One of the best ways to understand Patterns in .NET
is to look for new ones. In this session, Richard will lead an interactive exercise of uncovering existing patterns in the .NET Framework as well as looking for new ones.
|Richard Hale Shaw||Chalk Talk|
|300||Implementation Patterns in .NET||
The .NET Framework consists of a large number of
patterns. Some of these are implemented for you (and you simply utilize them), some require that you implement them where appropriate (such as the Finalize and Dispose patterns), and others require your active participation along with the Framework of completing a Pattern to get results (such as in Web Forms). In this session, we'll explore Framework implementation patterns and how you can take advantage of them.
|Richard Hale Shaw||Presentation|
|300||Generics in C# 2.0||
C# 2.0 Generics will let you solve many of the
problems solved by templates in C++, only by using a different syntax and by creating types at runtime (in the CLR) rather than at compile time (as done by the compiler in C++). In this session, we'll look at the fundamentals of how the 2.0 CLR will instantiate Generic types, and how C# 2.0 will let you define and consume them using VS 2005 next year.
|Richard Hale Shaw||Presentation|
|300||Creating Custom Iterators: C# 1.0 vs. C# 2.0||
If you've ever created a custom Iterator in C# 1.0,
you already know: it's a complete pain. Each custom Iterator largely requires that you define a separate class (usually nested), implement several interfaces and provide factories for instantiating it. But in C# 2.0, a simple trick of creating a new method to enumerate values, have it return an interface handle and use a new keyword and - voila! - a custom Iterator class is created for you. In this session, we'll explore how C# 2.0 iterators work, and how you can use it to replace custom iterations in C# 1.0.
|Richard Hale Shaw||Presentation|
|300||.Net integration with Microsoft Office||
There has been much talk, and even excitement around, as well as confusion around the potential for utilizing the .NET technologies in the context of Office solutions. This presentation will show how the two can interact beyond simple automation type tasks.First there will be a demonstration of the creation and use of an add in for MS Access created in C#. The demonstration will show the steps necessary to create the add in, plus the use of it in MS Access. The second part will focus on using C# to interact with a backend database in Access as well as Excel.
|300||Smarphone Development Jumpstart||
A crash course on the ins and outs of developing for windows mobile
smartphone devices. We’ll write some code and cover a wide range of
1. Getting started
2. Dev environment tweaks
3. A survey of current devices
4. Design: constraints and considerations
5. Emulator vs. on-device debugging
6. Networking and connectivity options
With tips, tricks and traps learned (the hard way) from two years in the trenches, the goal of this talk is to shave a month off your first Smartphone project.
General discussion and drilldown of all things Smartphone. Possible
topics could include:
Best practices and lessons learned (expanding on earlier talk above)
Understanding the mobile ecosystem: Microsoft + Device Manufacturers + Carriers + Developers
Connectivity drilldown (SMS, MMS, WAP, WAP2.0, bluetooth, IR, sockets, http, webservices)
Compact Framework vs. Native
|Dave Mitchell||Chalk Talk|
|300||Distributing the Smart Client Applications||
The .Net framework reintroduced practical XCopy deployment after it had
been MIA for almost a decade. But the bar has been raised in that time.
Users’ don’t want to update applications; they want the applications to
update themselves and self updating is part of the Smart Client
This presentation discusses software distribution issues for Smart Client applications. It begins with XCopy deployment, discusses the implications of Code Access Security, shows when Setup projects are necessary, and concludes with a through examination of Microsoft’s Updater Application Block (UAB) and the problems the UAB solves.
|300||Building on the .Net Framework: Creating Professional WinForms Applications||
The .Net framework is a great start for building business applications.
It gives you the tools but there's lots of work to be done before your
What's more it shouldn't take to long to created. The programming environment should enable applications to be developed rapidly. This presentation is about the choices that have to be made and the framework that has to be developed to deliver a great application while making the application development process efficient.
The choices include solutions to handling:
Business objects, data, reporting business rules and replication
Supportability, tracing, command line parsing, and application lifetime management
The presentation discusses the choices made for a recent project that has resulted in a reusable framework for WinForms applications.
|300||Visual Studio Tools for Office Version 2005 (Special Presentation)||Visual Studio Tools for Office version 2005 delivers unprecedented support for developers building document-centric solutions for Word and Excel. This session will cover some of the new features in version 2005 and discuss how Visual Studio Tools for Office relates to other Office development offerings.||Catherine Heller (Microsoft Redmond)||Presentation|
|300||Developing Applications Under Windows XP Service Pack 2||
Windows XP Service Pack 2 delivers a number of safety technologies for
end-users. The changes in the Internet Connection Firewall, Web Browsing
experience, Email/IM and Application Memory Protection affect many
different application types. This session covers example applications,
how they are affected and how to modify them to work with Windows XP
SP2. The changes will also affect various development tools ranging from
Visual Studio .NET to SQL Remote Debugging. This
session also details how to configure your development environment to work successfully on machines with Windows XP SP2 installed.
|200||.Net Security in the Real World.
Examples from Corporate America We will walk through several scenarios
that illustrate the dos and don'ts of corporate security with an
emphasis on ASP.Net scenarios and secure coding practices. We will
reveal the hard won lessons that will help the audience to prioritize
threats based on what is really happening.
Examples include the creative use of Web Services to avoid insecure design compromises in the name of functionality as well as tips and tricks for making a hacker rue the day they came after your resources. Lastly we will show how Whidbey is already making life better and how it will swing the security battle in your favor.
Security is a war, don't fight fair.
|300||Visual Studio Tools for Office (Microsoft Product Group)||Join Catherine Heller and Shoshanna Budzianowski (Program Manager Microsoft) for a discussion around Visual Studio Tools for Office and how it can be used within your organization||Shoshanna Budzianowski(Microsoft Redmond)/Catherine Heller (Microsoft Redmond)||Chalk Talk|
|300||Implementing Cryptography in .NET||Learn how to implement cryptography in .NET. I will introduce symmetric and asymmetric cryptography and will discuss various symmetric and asymmetric algorithms (code not all ppt). Some of the key topics will be: DPAPI, DES, 3DES, RC2, Rijndael, MD2-5, etc.||Duane Laflotte||Presentation|
|300||Role Based Security||This session will describe how role-based security works, talk/show principal identities, and work with declarative and imperative security.||Duane Laflotte||Presentation|
|300||Developing Occasionally Connected Applications||Mobile Applications are becoming extremely important to enterprise customers. The Compact Framework provides an excellent framework for developing mobile applications. However, to make these applications interesting, you need to connect to enterprise resources. This session will show how you can develop occasionally connected applications using the .NET Compact Framework.||Duane Laflotte||Presentation|
|300||Designing and Utilizing XML Schemas||XML schemas are an integral component for effectively using XML in applications because they provide the model for XML data. This session will explore the tremendous power of XML schemas including the ability to define data types and structure for an XML document. In addition, this session will show how to design schemas for reuse so they can provide an organization with a consistent data model. Many examples will be examples of XML schemas usage in real life enterprise applications.||Chris Pels||Presentation|
|300||Understanding and Using the Power of XSLT||Extensible Stylesheet Language Transformation (XSLT) can be a valuable tool in applications that utilize XML data. XSLT provides the power to transform XML data into many other formats including HTML, a new XML structure, etc. This session will provide an overview of the major XSLT functionality as well as examples of usage in real life .NET applications. In addition, building a library of re-useable XSLT templates will be discussed.||Chris Pels||Presentation|
|200||Implementing the Microsoft Exception Management Application Block||The Microsoft Exception Management Application Block (EMAB) is a very useful addition to an application that provides functionality for logging exceptions to various destinations including the event log, XML files, text files, etc. This session will show how to install and implement the EMAB including the creation of custom exception classes that utilize the extensions provided by EMAB for storing custom data. In addition, several examples of writing custom “publishers” for logging exceptions to various destinations using the standard publishing interface provided by EMAB will be discussed.||Chris Pels||Presentation|
|400||Architectural Considerations in a Real Life Object Centric Service Oriented Application||The .NET Framework has brought enormous power for developing robust applications in an object oriented manner. This session will discuss the considerations and decision making process associated with architecture of a real life enterprise application as well as review several major aspects of the code in detail. The application makes significant use of web services to provide a number of services to users in addition to an object centric approach to data. In addition, the application incorporates a “data provider” model that allows for multiple data providers of different types in a single application. There is also significant us of XML serialization, XML schemas, and XSLT.||Chris Pels||Presentation|
|200||Introduction to VB.NET Part 1||If you have experience with Visual Basic 4, 5, or 6 and you're new to VB.NET then this session is for you. Noted VB developer, author, speaker, teacher, and advocate Carl Franklin takes you through VB.NET from a VB.OLD perspective. Along the way you'll learn about the differences in objects, native data types, arrays, collections, error handling, and other environment-related features.||Carl Franklin||Presentation|
|300||Introduction to VB.NET Part 2||
In this second half of this first look at the VB.NET language we'll go
deeper into Inheritence and Interface
Implementation. We'll build on existing custom controls and see how Interfaces make applications more flexible and powerful.
|300||XML Web Services and the AS/400||A marriage between traditional AS/400 programming and the .NET environment. This session demonstrates how to develop .NET web services over the AS/400 using traditional RPG (or COBOL) programs on the AS/400. We will utilize the HTTP server on the AS/400 as the communication mechanism. The traditional style (almost) AS/400 programs will return XML formatted data, leaving us .NET programmers to do what we do best.||Jeff Pyzynski||Presentation|
Developing Web Parts for SharePoint Portal Server
Learn what Web Parts are and how to create them. Developers can build Web Parts as ASP.NET custom controls. However, unlike standard ASP.NET controls, which are added to Web form pages by programmers at design time, Web Parts are intended to be added to Web Part Zones on Web Part Pages by users at run time. In many ways, Web Parts blur the traditional distinction between design time and run time. The run-time experience of a user working with Web Parts in a browser is similar to the design-time experience of a Microsoft Visual Basic programmer adding controls to a form and setting their properties. Attend this session to learn more about developing and implementing Web Parts.
Real-world ASP.NET examples including useful
What’s New in Visual Studio 2005?
|The focus of Part I will be on the main improvements of the core Visual Studio 2005 as they relate to ASP.NET development. We’ll briefly cover core IDE improvements like refactoring, improved window docking, IntelliSense improvements, code expansions and the Class Designer. The majority of the session will focus on improvements with ASP.NET 2.0. Topics will include master pages, themes, new out-of-the-box controls, site maps, providers, compliance checking, web-based site management, validation changes and much more. This session assumes familiarity with ASP.NET 1.0/1.1 development||Christopher
What’s New in Visual Studio 2005?
|In Part II, we focus on the Team System version of Visual Studio 2005. VSTS includes many features oriented toward making group interaction and project lifecycle management easier. From Team Foundation to Team Architect, Test and Developer, VSTS brings an impressive array of new functionality. Topics covered will be unit and stress testing, code coverage, static analysis, code profiling, the source control system (“Hatteras”), the “Whitehorse” visual designers, build automation, reporting and more||Christopher
|300||Integrate SQL Server Reporting Services With ASP.NET||One of the strengths of SQL Server Reporting Services (SSRS) is the number of options available for integrating reports into an application. This presentation will focus on techniques for combining SSRS reports with an ASP.NET application. The techniques to demonstrate include URL access with a report viewer component, invoking SSRS web services, and taking advantage of SSRS delivery extensions. The presentation will also address security, roles, and impersonation options available from ASP.NET environments.||Scott Allen||Presentation|
|300||Web Presentation Design Patterns Part I||Web presentation design patterns help us create applications that are easier to maintain, extend, and test. They can also provide a means to manage the flow of a user's experience in an application. Part I of this presentation will cover the Model-View-Controller, Page Controller, and Application Controller patterns.||Rob Daigneau||Presentation|
|300||Web Presentation Design Patterns Part II||Part II of "Web Presentation Design Patterns" will cover the Front Controller design pattern in great detail. Additionally, a real-world application which uses elements of several web presentation patterns will be demonstrated. We'll end the session with a review of a few resources you may reference.||Rob Daigneau||Presentation|
|300||Enterprise Application Authorization With Microsoft Authorization Manager||Would plan to discuss a real-world implementation of Authorization Manager. Would focus on best practices, pitfalls and provide code samples for implementing Authorization Manager in a web based application. Presentation will also include code from a utility that loads an XML AzMan store into an AD AzMan store as well as an Excel spreadsheet application based upon VSTO that provides a “simpler” user interface to the AzMan store for bulk loading operations and role mappings||Michael Pelletier
|300||Know thy Cache||
There is no better way to dramatically improve the performance of most web applications than by using the ASP.Net Cache.
In "Know thy Cache" we will explore various techniques and best practices for getting the most out of ASP.Net Cache object. In addition, we will look at some of the amazing advancements to the Cache which will be possible in ASP.Net 2.0
|300||Effective State Management with ASP.Net||
Managing state is one of the biggest keys to a successful web
application. Fortunately .NET/ASP.Net 1.x provides developers with quite
a few ways to manage state and version 2.0 raises the bar even further.
Managing state is not very difficult. The real key is simply picking the
best solution for your project.
In "Effective State Management with ASP.Net" we will explore all of the ways to manage state and learn how and when to use each. In addition, we will spend a little time looking at how ASP.Net 2.0 will raise the bar even further.
|Scott Watermasysk||Chalk Talk|
|300||Securing Service Oriented Architecture with WSE 2.0||Businesses have started to use Service Oriented Architecture (SOA) to develop high value, and flexible corporate software applications. These applications are typically developed as Web services. Securing these Web services is critical for them to be widely used by businesses and customers. Traditional security protocols are often inadequate for these applications. The security community has developed a new security model to handle securing these Web services. Microsoft has developed the WSE 2.0 technology to make using this new security model much easier. This talk will explain how to use Microsoft’s WSE 2.0 technology to secure applications based on a SOA or a Web service.||Michael Stiefel||Presentation|
|300||SOA and WebServices in real life||
We just architected a new Services Oriented Architecture for a Hi-Tech
Manufacturing company and launched their new site leveraging two Web
Services: one for User Management (i.e.: registration, login, etc) and one for the Shopping Cart. The requirements for the user management and the shopping cart are that both of these services need to be accessed by other applications written in .Net, ASP/COM and Java.
The goal of the presentation is twofold:
1) overview of what the SOA looks like and what constitutes an SOA
2) show code of how we implemented at least one of the two Web Services (if not both, time permitting)
|Riccardo La Rosa||Presentation|
|300||ASP.Net and SQL Server Authentication||A discussion about the various authentication models available (Windows Integrated vs. SQL Logins, single login per app vs. a separate login for each user), their advantages and limitations, and when to use them (intranet vs. public website). The discussions may include SQL Server resource usage, connection pooling, granular security and application vs. trigger based logging.||John Bastow||Chalk Talk|
|300||Web Services in Microsoft Office||
This demonstration will show the use of web services in Office products
such as Word or Excel. The first segment will show how to reference a
web service to an Office document and the choices for invoking it. There
will be a couple of examples that will show the potential for practical
application of this technique.
The second part will show how to create a two way conversation with a web service from within InfoPath. The sample InfoPath application will update the data for a web service then pull data from that same web service.
|400||Tips and Tricks for Building Server Controls||Explore advanced control building topics, including state management, composition, templates, data-binding, and providing rich design-time support for tools like Visual Studio .NET. This tips and tricks filled session presents everything in digestible nuggets, so you can go home and start building advanced server controls immediately.||Patrick Hynds||Presentation|
|400||Tips and Tricks for Web Forms Programming||
Push your ASP.NET Web form programming to the extreme. This session
teaches you advanced tips and tricks for ASP.NET page development,
including UI that morphs based on the data it displays, dynamic
templates, passing values from page to page, adding client scripts, and
|300||Building Custom Web Controls||ASP.NET web controls are easy to work with because of the rich object-oriented architecture behind ASP.NET. I'll show you how to create rich composite controls without hard-coding HTML in your code.||Carl Franklin||Presentation|
|300||Messaging Principles in the WSE||WSE is probably best known for its security capabilities but it also contains a rich set of messaging features that allow the implementation of Message Exchange Patterns (MEP). We will discuss the principals of messaging via WS-Messaging and WS-Addressing, and of course a few code examples. These technologies are critical to building and scaling Service Oriented Architectures.||Jim Lennox||Presentation|
|300||Application Development Best Practices||
Join Ivis Technologies for a learning session focused on internet application development. Specific topics include:
Implementing a robust and maintainable security framework
Developing business requirements to be deployed with a modular presentation tier
Utilizing .NET best practices to localize your internet applications
Leverage XBoost and Visual Studio to develop and deploy your internet applications more efficiently.
|300||SQL Server Security||This talk will demonstrate steps and techniques to insure a freshly installed SQL Server database is secure. I will also demonstrate best practices to permit client applications to access SQL Server securely, prevent SQL Injection, and to effectively audit and implement an intrusion detection plan.||Robert Hurlbut||Presentation|
|200||Implementing the Data Mapper Pattern with .Net||For those of you that are not pattern aware (yet), the
process that you go through when converting data to business objects is
called a Data Mapper Pattern. The Data Mapper layer handles the creation
your business objects (aka your domain) from data, and hopefully it doesn’t even know that there is a database (thanks to the data access layer). In a domain-less (aka no business object) world the mapping step is skipped entirely, and datasets are used, with the business rules all tied up in the presentation tier or down in the database. A slight advancement over the pure dataset method is strongly-type datasets, but unless you modify the generated code, you can not add the business rules into your strongly-typed datasets (at least until .Net 2.0’s partial classes). In this session we will not use either approach, but instead create our own business objects,
and will be using the current Data Access Application Block for our data access layer. There are 4 major ways to implement the Data Pattern, which are dependent on the object that is returned from the data access layer,
DataReader, DataSet, XPathNavigator, and XmlSerialization. We will use one of these implementations (determined by the audience) and later briefly go over the other 3 methods.
|200||Using SQL Server 2005 Express
||Interested in discussing the ins and outs of the next generation of
This Q&A session is designed to help you get started with SSX and its associated tools.
|300||XML and CLR features of SQL Server 2005
||We all know that SQL Server 2005 will be a great relational database
server, but what are the developer and DBA implications of its support
for XML and CLR-based types, functions and procedures. This session
provides an overview of these features and covers the best practices for
|300||SQL Server 2005 Service Broker||Service Broker is a framework built into SQL Service 2005 that greatly simplifies the creation of reliable, scalable, message-based, asynchronous, distributed database application. A service broker can manage business transactions, which in practice can last for hours, days or indefinitely and span databases. A Service Broker application consists of a set of services, queues, message formats, and dynamically created conversation. Any application that can make a connection to SQL Server or a web service can make use of a Service Broker application. This session will cover the basics of Service Broker and show the implementation of a Service Broker application.||Robert Hurlbut||Presentation|