There are many possible breakout sessions that you can attend to learn about building your next generation line-of-business application. The remainder of this document makes session recommendations.
The following table lists the sessions that we recommend you attend on Monday to learn more about building the next generation line-of-business application.
Recommended Session |
ID |
Session Alternative(s) |
||||||
Building General Purpose Internet & Intranet Services |
WCS-9 |
Using Integrated Security Features of Windows NT |
||||||
WCS-10 |
Fundamentals of DCOM (DCOM 1) |
|||||||
Microsoft Internet Security Framework |
DTDS-2 |
Creating Enterprise Solutions Using Visual C++Ò Enterprise |
||||||
WCS-11 |
Advanced DCOM Techniques (DCOM 2) |
|||||||
High Performance Features |
WCS-2 |
Windows NT - A Multilingual Platform |
||||||
WCS-13 |
DCOM on Other Platforms |
|||||||
MBS-8 |
Writing Data Communications Applications Using TAPI |
|||||||
Creating ActiveX Components Using C/C++ |
The following table lists the sessions that we recommend you attend on Tuesday to learn more about building the next generation line-of-business application.
Recommended Session |
ID |
Session Alternative(s) |
||||||
Developing Distributed Applications 1 (Viper 1) |
AS-18 |
The Microsoft Message Queue Architecture (Falcon 1) |
||||||
WCS-6 |
Common Internet File System (CIFS) |
|||||||
CT-6 |
Downloading Data with URL Monikers & Navigating |
|||||||
Developing Distributed Applications 2 (Viper 2) |
WCS-12 |
DCOM & Security (DCOM3) |
||||||
AS-5 |
Denali Programming 1: Building Active Server Pages |
|||||||
MBS-7 |
Developing Distributed Database Application with MS DTC |
|||||||
Administration & Packaging of "Viper" Applications (Viper 3) |
WCS-10 |
Fundamentals of DCOM (DCOM1) |
||||||
AS-6 |
Denali Programming 2: Building Applications |
|||||||
CT-9 |
Building Distributed ActiveX Applications Using Java & DCOM |
The following table lists the sessions that we recommend you attend on Wednesday to learn more about building the next generation line-of-business application.
Recommended Session |
ID |
Session Alternative(s) |
||||||
Security Issues in "Viper" Environments (Viper 4) |
WCS-5 |
Windows NT Inter-Networking |
||||||
AS-21 |
Componetizing Data Access through OLE DB |
|||||||
Advanced Application Design Issues (Viper 5) |
AS-1 |
Programming Your Web Server |
||||||
SEC-4 |
Overview of Cryptography API 2.0 |
|||||||
Viper Architectural Overview 1 (Viper 6) |
AS-3 |
Writing High-Performance Web Server Extensions (ISAPI) |
||||||
SEC-5 |
Implementing Cryptography API 2.0: Code Walk-Through |
|||||||
Viper Architectural Overview 2 (Viper 7) |
AS-7 |
Denali Programming 3: Creating/Using Components |
||||||
AS-25 |
Data-Aware Web Applications: Microsoft ADC |
|||||||
CT-4 |
Developing Advanced ActiveX Controls |
The following table lists the sessions that we recommend you attend on Thursday to learn more about building the next generation line-of-business application.
Recommended Session |
ID |
Session Alternative(s) |
||||||
Programming a Distributed Message Queue Application (Falcon 2) |
AS-5 |
Denali Programming 1: Building Active Server Pages |
||||||
AS-10 |
Developing Distributed Applications 1 (Viper 1) |
|||||||
AS-23 |
Exposing Your Data Through OLE DB |
|||||||
AS-24 |
Using ADO to Access OLE DB Data |
|||||||
WinInet APIs |
AS-11 |
Developing Distributed Applications 2 (Viper 2) |
||||||
AS-26 |
Tutorial: In-Depth Look at Microsoft ADC Applications |