Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

Related Topics: Microsoft Cloud, Industrial IoT, Microservices Expo, Silverlight

Microsoft Cloud: Book Review

Book Review: Building Windows 8 Apps with C# and XAML

Microsoft Windows Development Series

This book is the perfect size and the perfect depth for getting up to speed quickly with building Windows 8 Store Applications.

The book starts by introducing WinRT. This introduction includes a really nice history of how Microsoft got to where they are now. It starts with a look back at MS-DOS, MS-DOS Executive, the Win32 API, COM, and.NET. The introduction leads us up to NUI (Natural User Interface) and the Windows Store Application Design Principles.

The first chapter ends with a look at the Windows 8 tool that are available to developers and designers. They include, Blend for Visual Studio, C++ and XAML, HTML5 and JavaScript, and VB/C# and XAML.

I have listed all the chapters below.

1. The New Windows Runtime
2. Getting Started
3. Extensible Application Markup Language (XAML)
4. Windows 8 Applications
5. Application Lifecycle
6. Data
7. Tiles and Toasts
8. Giving Your Application Charm
9. MVVM and Testing
10. Packaging and Deploying

The Getting Started chapter covers setting up your environment, which includes Windows 8, Visual Studio 2012, and expression blend for Visual Studio. It also covers the details of all the available project templates that come in the Windows Store category of Visual Studio's project templates.

The book then continues on with a nice overview of XAML. The author does a good job of covering a lot of topics as well as going in-depth enough to give you a thorough understanding of the topics that he chose to cover. XAML is a big topic, but the author did a great job of covering the essentials needed to get started.

Chapter 4, Windows 8 Applications, starts out with a nice overview of the Windows 8 simulator that comes with the development environment. The chapter continues on covering the application view states, semantic zoom, how to handle user input, mouse support, keyboard support, sensors, the application bar, and much more.

The one thing that the book really brought to light was a big flaw with the Windows Store Applications design. Not so much by explicitly pointing it, but rather by having nothing to say about it. That flaw being, a complete lack of capability for the applications to be run off-line with any sizable local data store. There really is no large data storage available to the Windows Store Applications beyond application state persistence. That raised a big red flag.

In searching the web, I found a lot of people having big issues with that. It looks like SQLite has come up with a solution they say will make it through the Windows Store approval process.

The chapter Giving Your Application Charm covers contracts and Windows 8 Extensions which allow for application information sharing handled at an operating system level. This is one of the coolest features built into Windows 8.

The book ends with a short chapter on MVVM and unit testing, and a short chapter on packaging and deploying.

The author has all the examples used in the book available for download. They're very well organized and usable. All of the examples ran without needing any modification.

Overall I found this book an enjoyable read. I thought the author's writing style made the book very easy to read from cover to cover. I will also be keeping it by on my side to use as a reference.

If you are planning on building Windows 8 Applications with C# and XAML, I recommend you start with this book. It will give you a great foundation on which to build your experience.


Building Windows 8 Apps with C# and XAML

More Stories By Tad Anderson

Tad Anderson has been doing Software Architecture for 18 years and Enterprise Architecture for the past few.

IoT & Smart Cities Stories
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.