Developers have been using GPS and WiFi location detection to enhance their mobile applications and reduce the amount of input required by users by detecting where the user is at a given point in time. However these location detection techniques can only give an accuracy of approximately 10 metres, and are unreliable when the user is indoors.
Bluetooth Low Energy beacons (and in particular, Apples implementation ‘iBeacons’) give developers a way to solve this. By placing beacons in an environment applications can detect their location to a much higher accuracy than previously possible. This opens up a huge opportunity for a new wave of mobile apps that create amazing experiences within a physical location.
This session will introduce iBeacons, and discuss the opportunities they open up to developers. We will look at the technical aspects of what makes an iBeacon, and take a look at some of the aspects of the iOS iBeacon SDK. We will then use Xamarin to demonstrate in C# how to detect beacons in both iOS and Android environments.
This session is part of a new conference called Xamarin Hack Day. Michael Ridland, along with SSW, created Xamarin Hack Day to give developers the opportunity to get together and spend the day hacking away with Xamarin.
Take the Quiz!
About the speakers
Rod Howarth is a Senior Developer at Envoy with experience in Web and Mobile applications and has launched both native Objective C and Xamarin iOS applications to the app store.
Quick Question – How many Visualization options come built-in with Power BI? Quick Answer – Not nearly enough. Prem will walk you through the extra visualizations that are in the wonderful awesome Power BI Visuals Marketplace called AppSource. However, no matter how many options you find, there is always a need for that little bit…
Watch this demo of how a hacker who has broken into your machine can quickly and easily get your password hashes, take them offline and crack them to retrieve your original password. In this talk, Alexei discusses how passwords are stored in Windows, some techniques real-world hackers use to crack password hashes and what you…
Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…
Matt Wicks talks with Yaser about his talk at NDC: Tuning web performance with just browser APIs For more interviews, watch the full video playlist:
The 5 important questions about .NET 5 Back in 2016 Microsoft made the brave step of building a brand new .Net Core away from the classic “Full Framework” .NET. This meant they were able to hit the “Redo button” in so many ways, bringing us the modern, open-source, fast and cross-platform framework that we use…
.NET Core allows us to log just about everything very easily, but when something goes wrong with SQL queries, how exactly do you figure out where it’s coming from…? This is where EF Core Query Tags comes into play, along with a couple of logging strategies, you’ll never be confused by the intent and location…
It takes more to be a great coder than you might think! Check out this video from NDC Sydney featuring Adam Cogan, Michael Smedley and Matt Goldman on the importance of teamwork and good communication in software development. Learn about SSW’s new mobile app and how it connects us with the software development community.
Pragmatic DevOps It’s easy to feel like DevOps is too hard to implement because the theory is hard to apply in their company. Rather than give up, it’s important to be pragmatic and try to solve the problems. To do this effectively, you need the theory. With books like The Phoenix Project and The Unicorn…
New features of C#8.0 SSW’s Andreas Lengkeek talks with ‘the C# guy’ Filip Ekberg on the new features of C# 8.0 and what’s coming down the line. They discuss: – Nullable Types – Async Streams – Pattern Matching – Coming up features