Code Camp II: The Return

October 16, 17 2004
Microsoft New England
201 Jones Rd.
Waltham, Ma.

Have you registered?

Agenda

Smart Client

Level Title Description Speaker Type
300 Introduction to the .NET CLR and Internals Confused by all the terms like CLR, CTS, BCL, FCL, CLI and the like? Want to know what they mean and what they do? Want to understand the basics of using the .NET Framework? Come to this presentation and Sam, who has been working with .NET for nearly five years, will present the basics that are applicable to any .NET language that you choose to use. In addition to de-mystifying the acronyms, Sam will cover topics like assemblies, JIT compiling, Reference versus Value Types, and Garbage Collection. In addition, insights into how to best utilize the .NET Framework in various scenarios including Interop will be presented Sam Gentile Presentation
300 Introduction to the .NET COM Interop Managed code is wonderful but many companies have millions of lines of existing COM Interop. The good news is that .NET has extensive Interop facilities. The bad news is that Interop, in real world applications can be very hard. This session will provide an introduction to Runtime Callable Wrappers (RCW) and COM Callable Wrappers (CCW) and how to use them in your code. Sam Gentile Presentation
300 Introduction to Mobile Development with the Whidbey Compact Framework 2.0 You may have heard that developing for mobile devices such as PocketPCs and SmartPhones is possible with .NET. Not only is it possible, but the .NET Compact Framework actually makes it much easier than earlier methods such as eVC++ and eVB. The catch is that the Compact Framework 1.1, you are constrained to a small subset of framework. The good news, is that Whidbey’s Compact Framework 2.0 and SDE Tools provide not only much more of the framework but a first-class development platform for creating mobile applications. In this session, I will outline all the new features and we will see a bunch of cool demos. Sam Gentile Presentation
300 Introduction to Code Access Security In unmanaged Win32 applications, the operating system authorized access to resources based solely on who was running the program. In today's highly distributed, component-oriented environment, you need a security model based on what a given piece of code, a component, is allowed to do. .NET allows you to configure permissions for components, and provide an evidence to prove that it has the right credentials to access a resource or perform some sensitive work. This talk will cover evidence, policy, permissions, and runtime enforcement (stalk walking, etc.) I will also show how to manage application security using the .Net configuration tool and programmatically. Robert Hurlbut Presentation
400 Writing Secure Windows Forms Applications This talk will demonstrate coding techniques to make sure your Windows Forms application is secure. Topics covered will be isolated storage, code access security permissions, partially trusted design and development, and no-touch deployment security issues. Robert Hurlbut Presentation
300 Agile Development with .NET

 

Agile methodologies are rapidly gaining in popularity and have become increasingly important to understand.  Much has been written and many tools exist today to assist with the adoption of Agile methods.  This session will begin with an overview of the main tenets of Agile development.  We'll then focus on some core development practices:  effective unit testing and test-driven development, refactoring, implementing an automated build and achieving continuous integration, all within a .NET environment.  Current tools such as NUnit, NAnt, CruiseControl.NET and others will be introduced.  Brief mention of the Agile features coming in Visual Studio 2005 will be made.  Throughout the session, I'll relate our experiences with these approaches and tools at Monster.com.

Christopher
Bowen
Presentation
300 Effective Development Practices in .NET This interactive peer discussion will focus on development practices, ranging from design to coding and deployment. Topics may include, but will certainly not be limited to, successfully implementing development standards, code reviews, practices sharing, class reuse, code management, related tools, training and more. What’s worked for you and, equally important, what has not? Having trouble implementing a specific practice in your organization? Looking for tips on what tools might make your development life easier? This will be a great chance to pick the collective brains of other experienced .NET developers. The speaker will give examples of what methodologies and tools have worked, and which have failed, in practice at Monster.com. Christopher
Bowen
Chalk Talk
300 Options for Coordinating a Distributed System Today's solutions often involve communicating with other systems. Sometimes they are on the same machine (although different processes); sometimes they are on different machine, and sometimes they are even on different domains. Microsoft offers a variety of technologies to help with this - but not all technologies are created equal. This presentation will cover .Net Remoting, Web Services and Microsoft Message Queue (MSMQ); the pros and cons of each and re-enforce the technology with .Net code samples. Kevin E. Ford Presentation
300 Creating Dynamic UIs in WinForm Applications With the .NET Framework, it’s quite easy to create a framework that allows a developer to change the look and feel of a UI without the need to alter any code. This session will cover the design and development of a CSS-like WinForms engine developed by the speaker, along with alternative approaches to WinForms UI design that can be used today (i.e. Xamlon - http://www.xamlon.com). Jason Bock Presentation
300 Asynchronous programming in .NET Creating responsive applications requires using asynchronous techniques to perform work off of the UI thread. This session will cover timers, threads, the thread pool, synchronization techniques and a peak at what .NET 2.0 has to offer asynchronous programmers Dan Golick Presentation
200 Extracting Data Using .Net Regular Expressions An introduction on regular expressions and the .net regular expressions classes. I will introduce regular expressions by walking through how they made it easy to extract data from a text credit report. I will also discuss the relevance of regular expressions when parsing HTML. John Bastow Presentation
300 Using Design Patterns in Software Development This session is for any programmer who believes there is a better, more elegant solution to their most recent programming challenge! Design patterns are recurring solutions to software design problems you find time and again in real-world application development. While the topic of design patterns can be vast this session will primarily focus on four key patterns that most enterprise application developers can receive benefit immediately after implementation.

Factory Method - (Creational Pattern) Creates an instance of several derived classes
Singleton - (Creational Pattern) A class of which only n instances can exist, typically 1
Command - (Behavioral Pattern) Encapsulate a command request as an object
Memento - (Behavioral Pattern) Capture and restore an object's internal state
 
Michael Williams Presentation
300 Developing as a non-admin We have all heard we shouldn’t run as administrator on our computers. But, how do you develop software as a non-admin (i.e. normal/limited user)? It really is a lifestyle change. This interactive talk will discuss techniques and reasons for developing as a non-admin, as well as problems, solutions, and experiences developers have encountered as they have tried to develop software as a non-admin. Robert Hurlbut Chalk Talk
300 Patterns in C# Programming
 
What do the lock, using, foreach and unsafe keywords
actually do? Each one generates a pattern of IL code from a template, and then customizes it based on the context of its use. C# 2.0 continues this with patterns for generating Generic types, and custom Iterators. In this session, we'll explore Patterns in C#, with an eye to how to better understand how the C# language really works.
Richard Hale Shaw
 
Presentation
300 Best and Worst Practices in C# Programming How efficient is lock? When should you use readonly
vs. const? Why is casting evil - and what do you do about it? (Answer: use as or is.) This session will enumerate a number of Best - and Worst Practices - for C# programmers, and show you solutions you can use right away.
Richard Hale Shaw
 
Presentation
300 Pattern Mining with .NET One of the best ways to understand Patterns in .NET
is to look for new ones. In this session, Richard will lead an interactive exercise of uncovering existing patterns in the .NET Framework as well as looking for new ones.
Richard Hale Shaw Chalk Talk
300 Implementation Patterns in .NET The .NET Framework consists of a large number of
patterns. Some of these are implemented for you (and you simply utilize them), some require that you implement them where appropriate (such as the Finalize and Dispose patterns), and others require your active participation along with the Framework of completing a Pattern to get results (such as in Web Forms). In this session, we'll explore Framework implementation patterns and how you can take advantage of them.
Richard Hale Shaw Presentation
300 Generics in C# 2.0 C# 2.0 Generics will let you solve many of the
problems solved by templates in C++, only by using a different syntax and by creating types at runtime (in the CLR) rather than at compile time (as done by the compiler in C++). In this session, we'll look at the fundamentals of how the 2.0 CLR will instantiate Generic types, and how C# 2.0 will let you define and consume them using VS 2005 next year.
Richard Hale Shaw Presentation
300 Creating Custom Iterators: C# 1.0 vs. C# 2.0 If you've ever created a custom Iterator in C# 1.0,
you already know: it's a complete pain. Each custom Iterator largely requires that you define a separate class (usually nested), implement several interfaces and provide factories for instantiating it. But in C# 2.0, a simple trick of creating a new method to enumerate values, have it return an interface handle and use a new keyword and - voila! - a custom Iterator class is created for you. In this session, we'll explore how C# 2.0 iterators work, and how you can use it to replace custom iterations in C# 1.0.
Richard Hale Shaw Presentation
300 .Net integration with Microsoft Office

There has been much talk, and even excitement around, as well as confusion around the potential for utilizing the .NET technologies in the context of Office solutions. This presentation will show how the two can interact beyond simple automation type tasks.

First there will be a demonstration of the creation and use of an add in for MS Access created in C#. The demonstration will show the steps necessary to create the add in, plus the use of it in MS Access. The second part will focus on using C# to interact with a backend database in Access as well as Excel.
Robert Holmes Presentation
300 Smarphone Development Jumpstart A crash course on the ins and outs of developing for windows mobile smartphone devices. We’ll write some code and cover a wide range of topics, including:
1. Getting started
2. Dev environment tweaks
3. A survey of current devices
4. Design: constraints and considerations
5. Emulator vs. on-device debugging
6. Networking and connectivity options
7. Deployment
With tips, tricks and traps learned (the hard way) from two years in the trenches, the goal of this talk is to shave a month off your first Smartphone project.
Dave Mitchell
 
Presentation
300 Smartphone Q&A General discussion and drilldown of all things Smartphone. Possible topics could include:
Best practices and lessons learned (expanding on earlier talk above)
Understanding the mobile ecosystem: Microsoft + Device Manufacturers + Carriers + Developers
Connectivity drilldown (SMS, MMS, WAP, WAP2.0, bluetooth, IR, sockets, http, webservices)
Compact Framework vs. Native
Platform futures
Dave Mitchell Chalk Talk
300 Distributing the Smart Client Applications The .Net framework reintroduced practical XCopy deployment after it had been MIA for almost a decade. But the bar has been raised in that time. Users’ don’t want to update applications; they want the applications to update themselves and self updating is part of the Smart Client paradigm.

This presentation discusses software distribution issues for Smart Client applications. It begins with XCopy deployment, discusses the implications of Code Access Security, shows when Setup projects are necessary, and concludes with a through examination of Microsoft’s Updater Application Block (UAB) and the problems the UAB solves.
Andrew Novick Presentation
300 Building on the .Net Framework: Creating Professional WinForms Applications The .Net framework is a great start for building business applications. It gives you the tools but there's lots of work to be done before your application is:

Supportable
Maintainable
User-Friendly
Robust
What's more it shouldn't take to long to created. The programming environment should enable applications to be developed rapidly. This presentation is about the choices that have to be made and the framework that has to be developed to deliver a great application while making the application development process efficient.

The choices include solutions to handling:
Business objects, data, reporting business rules and replication
Presentation, user-friendliness
Supportability, tracing, command line parsing, and application lifetime management
The presentation discusses the choices made for a recent project that has resulted in a reusable framework for WinForms applications.
Andrew Novick Presentation
300 Visual Studio Tools for Office Version 2005 (Special Presentation) Visual Studio Tools for Office version 2005 delivers unprecedented support for developers building document-centric solutions for Word and Excel. This session will cover some of the new features in version 2005 and discuss how Visual Studio Tools for Office relates to other Office development offerings. Catherine Heller (Microsoft Redmond) Presentation
300 Developing Applications Under Windows XP Service Pack 2 Windows XP Service Pack 2 delivers a number of safety technologies for end-users. The changes in the Internet Connection Firewall, Web Browsing experience, Email/IM and Application Memory Protection affect many different application types. This session covers example applications, how they are affected and how to modify them to work with Windows XP SP2. The changes will also affect various development tools ranging from Visual Studio .NET to SQL Remote Debugging. This
session also details how to configure your development environment to work successfully on machines with Windows XP SP2 installed.
Patrick Hynds Presentation
200 .Net Security in the Real World.
 
Examples from Corporate America We will walk through several scenarios that illustrate the dos and don'ts of corporate security with an emphasis on ASP.Net scenarios and secure coding practices. We will reveal the hard won lessons that will help the audience to prioritize threats based on what is really happening.
Examples include the creative use of Web Services to avoid insecure design compromises in the name of functionality as well as tips and tricks for making a hacker rue the day they came after your resources. Lastly we will show how Whidbey is already making life better and how it will swing the security battle in your favor.
Security is a war, don't fight fair.
Patrick Hynds Presentation
300 Visual Studio Tools for Office (Microsoft Product Group) Join Catherine Heller and Shoshanna Budzianowski (Program Manager Microsoft) for a discussion around Visual Studio Tools for Office and how it can be used within your organization Shoshanna Budzianowski(Microsoft Redmond)/Catherine Heller (Microsoft Redmond) Chalk Talk
300 Implementing Cryptography in .NET Learn how to implement cryptography in .NET. I will introduce symmetric and asymmetric cryptography and will discuss various symmetric and asymmetric algorithms (code not all ppt). Some of the key topics will be: DPAPI, DES, 3DES, RC2, Rijndael, MD2-5, etc. Duane Laflotte Presentation
300 Role Based Security This session will describe how role-based security works, talk/show principal identities, and work with declarative and imperative security. Duane Laflotte Presentation
300 Developing Occasionally Connected Applications Mobile Applications are becoming extremely important to enterprise customers. The Compact Framework provides an excellent framework for developing mobile applications. However, to make these applications interesting, you need to connect to enterprise resources. This session will show how you can develop occasionally connected applications using the .NET Compact Framework. Duane Laflotte Presentation
300 Designing and Utilizing XML Schemas XML schemas are an integral component for effectively using XML in applications because they provide the model for XML data. This session will explore the tremendous power of XML schemas including the ability to define data types and structure for an XML document. In addition, this session will show how to design schemas for reuse so they can provide an organization with a consistent data model. Many examples will be examples of XML schemas usage in real life enterprise applications. Chris Pels Presentation
300 Understanding and Using the Power of XSLT Extensible Stylesheet Language Transformation (XSLT) can be a valuable tool in applications that utilize XML data. XSLT provides the power to transform XML data into many other formats including HTML, a new XML structure, etc. This session will provide an overview of the major XSLT functionality as well as examples of usage in real life .NET applications. In addition, building a library of re-useable XSLT templates will be discussed. Chris Pels Presentation
200 Implementing the Microsoft Exception Management Application Block The Microsoft Exception Management Application Block (EMAB) is a very useful addition to an application that provides functionality for logging exceptions to various destinations including the event log, XML files, text files, etc. This session will show how to install and implement the EMAB including the creation of custom exception classes that utilize the extensions provided by EMAB for storing custom data. In addition, several examples of writing custom “publishers” for logging exceptions to various destinations using the standard publishing interface provided by EMAB will be discussed. Chris Pels Presentation
400 Architectural Considerations in a Real Life Object Centric Service Oriented Application The .NET Framework has brought enormous power for developing robust applications in an object oriented manner. This session will discuss the considerations and decision making process associated with architecture of a real life enterprise application as well as review several major aspects of the code in detail. The application makes significant use of web services to provide a number of services to users in addition to an object centric approach to data. In addition, the application incorporates a “data provider” model that allows for multiple data providers of different types in a single application. There is also significant us of XML serialization, XML schemas, and XSLT. Chris Pels Presentation
200 Introduction to VB.NET Part 1 If you have experience with Visual Basic 4, 5, or 6 and you're new to VB.NET then this session is for you. Noted VB developer, author, speaker, teacher, and advocate Carl Franklin takes you through VB.NET from a VB.OLD perspective. Along the way you'll learn about the differences in objects, native data types, arrays, collections, error handling, and other environment-related features. Carl Franklin Presentation
300 Introduction to VB.NET Part 2 In this second half of this first look at the VB.NET language we'll go deeper into Inheritence and Interface
Implementation. We'll build on existing custom controls and see how Interfaces make applications more flexible and powerful.
Carl Franklin Presentation

Web Track

Level Title Description Speaker Type
300 XML Web Services and the AS/400 A marriage between traditional AS/400 programming and the .NET environment.  This session demonstrates how to develop .NET web services over the AS/400 using traditional RPG (or COBOL) programs on the AS/400.  We will utilize the HTTP server on the AS/400 as the communication mechanism.  The traditional style (almost) AS/400 programs will return XML formatted data, leaving us .NET programmers to do what we do best.  Jeff Pyzynski Presentation
300

Developing Web Parts for SharePoint Portal Server

 

Learn what Web Parts are and how to create them. Developers can build Web Parts as ASP.NET custom controls. However, unlike standard ASP.NET controls, which are added to Web form pages by programmers at design time, Web Parts are intended to be added to Web Part Zones on Web Part Pages by users at run time. In many ways, Web Parts blur the traditional distinction between design time and run time. The run-time experience of a user working with Web Parts in a browser is similar to the design-time experience of a Microsoft Visual Basic programmer adding controls to a form and setting their properties. Attend this session to learn more about developing and implementing Web Parts.

Christian Manasseh Presentation
300 Advanced ASP.NET Real-world ASP.NET examples including useful
patterns, data caching, embedding client-side Javascript, avoiding cross-site scripting (XSS) attacks and more.
Gary Chamberlain
 
Presentation
300 What’s New in Visual Studio 2005?
Part 1
The focus of Part I will be on the main improvements of the core Visual Studio 2005 as they relate to ASP.NET development. We’ll briefly cover core IDE improvements like refactoring, improved window docking, IntelliSense improvements, code expansions and the Class Designer. The majority of the session will focus on improvements with ASP.NET 2.0. Topics will include master pages, themes, new out-of-the-box controls, site maps, providers, compliance checking, web-based site management, validation changes and much more. This session assumes familiarity with ASP.NET 1.0/1.1 development Christopher
Bowen
Presentation
300 What’s New in Visual Studio 2005?
Part 2
In Part II, we focus on the Team System version of Visual Studio 2005. VSTS includes many features oriented toward making group interaction and project lifecycle management easier. From Team Foundation to Team Architect, Test and Developer, VSTS brings an impressive array of new functionality. Topics covered will be unit and stress testing, code coverage, static analysis, code profiling, the source control system (“Hatteras”), the “Whitehorse” visual designers, build automation, reporting and more Christopher
Bowen
Presentation
300 Integrate SQL Server Reporting Services With ASP.NET One of the strengths of SQL Server Reporting Services (SSRS) is the number of options available for integrating reports into an application. This presentation will focus on techniques for combining SSRS reports with an ASP.NET application. The techniques to demonstrate include URL access with a report viewer component, invoking SSRS web services, and taking advantage of SSRS delivery extensions. The presentation will also address security, roles, and impersonation options available from ASP.NET environments. Scott Allen Presentation
300 Web Presentation Design Patterns Part I Web presentation design patterns help us create applications that are easier to maintain, extend, and test. They can also provide a means to manage the flow of a user's experience in an application. Part I of this presentation will cover the Model-View-Controller, Page Controller, and Application Controller patterns. Rob Daigneau Presentation
300 Web Presentation Design Patterns Part II Part II of "Web Presentation Design Patterns" will cover the Front Controller design pattern in great detail. Additionally, a real-world application which uses elements of several web presentation patterns will be demonstrated. We'll end the session with a review of a few resources you may reference. Rob Daigneau Presentation
300 Enterprise Application Authorization With Microsoft Authorization Manager Would plan to discuss a real-world implementation of Authorization Manager. Would focus on best practices, pitfalls and provide code samples for implementing Authorization Manager in a web based application. Presentation will also include code from a utility that loads an XML AzMan store into an AD AzMan store as well as an Excel spreadsheet application based upon VSTO that provides a “simpler” user interface to the AzMan store for bulk loading operations and role mappings Michael Pelletier
 
Presentation
300 Know thy Cache

There is no better way to dramatically improve the performance of most web applications than by using the ASP.Net Cache.

 

In "Know thy Cache" we will explore various techniques and best practices for getting the most out of ASP.Net Cache object. In addition, we will look at some of the amazing advancements to the Cache which will be possible in ASP.Net 2.0

Scott Watermasysk Presentation
300 Effective State Management with ASP.Net Managing state is one of the biggest keys to a successful web application. Fortunately .NET/ASP.Net 1.x provides developers with quite a few ways to manage state and version 2.0 raises the bar even further. Managing state is not very difficult. The real key is simply picking the best solution for your project.

In "Effective State Management with ASP.Net" we will explore all of the ways to manage state and learn how and when to use each. In addition, we will spend a little time looking at how ASP.Net 2.0 will raise the bar even further.
Scott Watermasysk Chalk Talk
300 Securing Service Oriented Architecture with WSE 2.0 Businesses have started to use Service Oriented Architecture (SOA) to develop high value, and flexible corporate software applications. These applications are typically developed as Web services. Securing these Web services is critical for them to be widely used by businesses and customers. Traditional security protocols are often inadequate for these applications. The security community has developed a new security model to handle securing these Web services. Microsoft has developed the WSE 2.0 technology to make using this new security model much easier. This talk will explain how to use Microsoft’s WSE 2.0 technology to secure applications based on a SOA or a Web service. Michael Stiefel Presentation
300 SOA and WebServices in real life We just architected a new Services Oriented Architecture for a Hi-Tech Manufacturing company and launched their new site leveraging two Web
Services: one for User Management (i.e.: registration, login, etc) and one for the Shopping Cart. The requirements for the user management and the shopping cart are that both of these services need to be accessed by other applications written in .Net, ASP/COM and Java.

The goal of the presentation is twofold:
1) overview of what the SOA looks like and what constitutes an SOA
2) show code of how we implemented at least one of the two Web Services (if not both, time permitting)
Riccardo La Rosa Presentation
300 ASP.Net and SQL Server Authentication A discussion about the various authentication models available (Windows Integrated vs. SQL Logins, single login per app vs. a separate login for each user), their advantages and limitations, and when to use them (intranet vs. public website). The discussions may include SQL Server resource usage, connection pooling, granular security and application vs. trigger based logging. John Bastow Chalk Talk
300 Web Services in Microsoft Office This demonstration will show the use of web services in Office products such as Word or Excel. The first segment will show how to reference a web service to an Office document and the choices for invoking it. There will be a couple of examples that will show the potential for practical application of this technique.

The second part will show how to create a two way conversation with a web service from within InfoPath. The sample InfoPath application will update the data for a web service then pull data from that same web service.
Robert Holmes Presentation
400 Tips and Tricks for Building Server Controls Explore advanced control building topics, including state management, composition, templates, data-binding, and providing rich design-time support for tools like Visual Studio .NET. This tips and tricks filled session presents everything in digestible nuggets, so you can go home and start building advanced server controls immediately. Patrick Hynds Presentation
400 Tips and Tricks for Web Forms Programming Push your ASP.NET Web form programming to the extreme. This session teaches you advanced tips and tricks for ASP.NET page development, including UI that morphs based on the data it displays, dynamic templates, passing values from page to page, adding client scripts, and more.
 
Patrick Hynds Presentation
300 Building Custom Web Controls ASP.NET web controls are easy to work with because of the rich object-oriented architecture behind ASP.NET. I'll show you how to create rich composite controls without hard-coding HTML in your code. Carl Franklin Presentation
300 Messaging Principles in the WSE WSE is probably best known for its security capabilities but it also contains a rich set of messaging features that allow the implementation of Message Exchange Patterns (MEP). We will discuss the principals of messaging via WS-Messaging and WS-Addressing, and of course a few code examples. These technologies are critical to building and scaling Service Oriented Architectures. Jim Lennox Presentation
300 Application Development Best Practices
Join Ivis Technologies for a learning session focused on internet application development. Specific topics include:

Implementing a robust and maintainable security framework
Developing business requirements to be deployed with a modular presentation tier
Utilizing .NET best practices to localize your internet applications
Leverage XBoost and Visual Studio to develop and deploy your internet applications more efficiently.
Sean McNeil Presentation

Data Track

Level Title Description Speaker Type
300 SQL Server Security This talk will demonstrate steps and techniques to insure a freshly installed SQL Server database is secure. I will also demonstrate best practices to permit client applications to access SQL Server securely, prevent SQL Injection, and to effectively audit and implement an intrusion detection plan. Robert Hurlbut Presentation
200 Implementing the Data Mapper Pattern with .Net For those of you that are not pattern aware (yet), the process that you go through when converting data to business objects is called a Data Mapper Pattern. The Data Mapper layer handles the creation of
your business objects (aka your domain) from data, and hopefully it doesn’t even know that there is a database (thanks to the data access layer). In a domain-less (aka no business object) world the mapping step is skipped entirely, and datasets are used, with the business rules all tied up in the presentation tier or down in the database. A slight advancement over the pure dataset method is strongly-type datasets, but unless you modify the generated code, you can not add the business rules into your strongly-typed datasets (at least until .Net 2.0’s partial classes). In this session we will not use either approach, but instead create our own business objects,
and will be using the current Data Access Application Block for our data access layer. There are 4 major ways to implement the Data Pattern, which are dependent on the object that is returned from the data access layer,
DataReader, DataSet, XPathNavigator, and XmlSerialization. We will use one of these implementations (determined by the audience) and later briefly go over the other 3 methods.
Don Demsak Presentation
200 Using SQL Server 2005 Express
 
Interested in discussing the ins and outs of the next generation of MSDE?
This Q&A session is designed to help you get started with SSX and its associated tools.

 
Kent Tegels
 
Chalk Talk
300 XML and CLR features of SQL Server 2005
 
We all know that SQL Server 2005 will be a great relational database server, but what are the developer and DBA implications of its support for XML and CLR-based types, functions and procedures. This session provides an overview of these features and covers the best practices for them.
 
Kent Tegels Presentation
300 SQL Server 2005 Service Broker Service Broker is a framework built into SQL Service 2005 that greatly simplifies the creation of reliable, scalable, message-based, asynchronous, distributed database application. A service broker can manage business transactions, which in practice can last for hours, days or indefinitely and span databases. A Service Broker application consists of a set of services, queues, message formats, and dynamically created conversation. Any application that can make a connection to SQL Server or a web service can make use of a Service Broker application. This session will cover the basics of Service Broker and show the implementation of a Service Broker application. Robert Hurlbut Presentation