In this video, SSW TV’s Adam Stephensen is joined by Michael Crump, who dives into his experiences developing for Windows Phone 8.
Michael is an MVP who works for our good friends at Telerik. He has written for MSDN, he is a PluralSight author and he has spoken all over the world.
In this video, they discuss:
- The phones that Michael has in his arsenal
- Pain points developing for the Windows Phone platform
- Upgrading from Windows Phone 7 to Windows Phone 8
- Maps control in Windows Phone 8
- In app purchasing
- Speech and text recognition
- Experiences with app development
- Getting a Cease and Desist letter for developing a Twitter app
- Lessons learned developing for Windows Phone
- What the future holds for the platform
This is great video for anyone who’s thinking about developing for the Windows Phone platform.
Don’t forget to ‘like’ and Subscribe to our newsletter to receive updates on new content from SSW TV.
If you have any feedback please leave a comment below.
Take the Quiz!
About the speakers
Windows Phone Afficianado
Michael Crump is a Microsoft MVP, INETA Community Champion, and an author of several .NET Framework eBooks. He speaks at a variety of conferences and has written dozens of articles on .NET development. He works at Telerik with a focus on our XAML control suite. You can follow him on Twitter at @mbcrump
In this Tech Talk, Andreas Lengkeek has a chat with Mehmet Ozdemir. We learn about Multitenancy with SQL Server, and go through some scenarios where this might be useful. In this video SSW Solution Architect Mehmet Ozdemir chats with Andreas Lengkeek about the three options for Multitenancy with SQL Server and how he goes about…
The world has embraced Serverless computing, but some systems still end up with the same problems we thought would be a thing of the past. William covers how we should apply familiar SOLID principles to our Serverless Application architecture and infrastructure. This lets you create systems that are are light, easy to maintain, and benefit…
How do you get environment- or tenant-specific config into your users’ hands? With mobile or desktop apps, for managed devices we can pre-configure these using SOE or MDM tools. However, deploying configuration to unmanaged devices is the real challenge! In this talk, Matt Goldman looks at some different options for automating this for your users.…
Quick Question – How many Visualization options come built-in with Power BI? Quick Answer – Not nearly enough. Prem will walk you through the extra visualizations that are in the wonderful awesome Power BI Visuals Marketplace called AppSource. However, no matter how many options you find, there is always a need for that little bit…
Watch this demo of how a hacker who has broken into your machine can quickly and easily get your password hashes, take them offline and crack them to retrieve your original password. In this talk, Alexei discusses how passwords are stored in Windows, some techniques real-world hackers use to crack password hashes and what you…
Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…
Matt Wicks talks with Yaser about his talk at NDC: Tuning web performance with just browser APIs For more interviews, watch the full video playlist:
The 5 important questions about .NET 5 Back in 2016 Microsoft made the brave step of building a brand new .Net Core away from the classic “Full Framework” .NET. This meant they were able to hit the “Redo button” in so many ways, bringing us the modern, open-source, fast and cross-platform framework that we use…
.NET Core allows us to log just about everything very easily, but when something goes wrong with SQL queries, how exactly do you figure out where it’s coming from…? This is where EF Core Query Tags comes into play, along with a couple of logging strategies, you’ll never be confused by the intent and location…