MIX10 has begun mixing, finally!

As you may or may not know by now, MIX is an annual event for designers and developers to learn about Microsoft’s broad web platform and tools. Designers and developers will learn about Microsoft’s broad web platform and tools that help bring together the clients, servers and cloud services needed for creating great rich web applications.

The Day 1 keynote and Day 2 keynote will begin at 9am PDT on Monday and Tuesday and will be delivered by Scott Guthrie, Joe Belfiore, Dean Hachamovitch, Doug Purdy, and Bill Buxton. These keynotes will be streamed live at the MIX10 website.

Immediately following each keynote (10:30am PDT), Channel 9 Live will begin streaming with a ton of live content throughout the day and a lot of special guests. You can check out the full Channel 9 Live schedule here and who will be stopping by!

You can submit questions through @c9live to be answered on Channel 9 Live throughout each day.

A full list of the sessions that will be covered can be found here

The highly anticipated MIX 10 Conference has started to mix Monday in Las Vegas

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Old Habits Die Hard: The report, which is in its fifth year, polled 1,100 senior IT security executives at large enterprises around the world and indicates an ongoing disconnect between the security solutions organizations spend money on and the ability of those solutions to protect sensitive data. While 30 percent of respondents classify their organizations as 'very vulnerable' or 'extremely vulnerable' to data attacks (and the number of breaches continues to rise) the two top spending priorities are network …

  • You know that visibility is critical to security. You simply can't secure what you can't see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization's cloud services, mobile endpoints, and digital ecosystems.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date