EmberConf 2019 Preview

Ember.JS DC
Ember.JS DC
Public group
Location image of event venue


We will have two speakers doing dry runs of their EmberConf talks. Each talk should be around 30 minutes.


- 6:30pm: [food] Grab a bite to eat, get settled in, meet your neighbors!

- 7:00pm: [talk] Typed Ember: Strong Types for Better Apps
- 7:30pm: [talk] Anatomy of an Addon Ecosystem

- 8:00 on: Networking


Typed Ember: Strong Types for Better Apps
by James C. Davis | @jamscdavis (https://twitter.com/jamscdavis)

Have you been curious about TypeScript, but not sure if it’s for you? Are you unconvinced of its advantages? Did you even know you could use TypeScript with Ember? If you answered yes to any of those questions (and even/especially if you didn’t) then this talk is for you!

Instead of a deep dive into using TypeScript with Ember, this talk will demonstrate everyday usage. We'll work to prove that switching to TypeScript to build your Ember apps and addons will make them more robust and maintainable, provide a better developer experience, and lead to improved productivity.



Anatomy of an Addon Ecosystem
by Lisa Backer | @eshtadc (https://twitter.com/eshtadc)

How do plugin-style addons actually work? Many of us have reaped the benefits of an Ember addon plugin approach, like with ember-service-worker and ember-cli-deploy.

These ecosystems utilize the build process to enable a plugin architecture requiring only configuration to implement powerful capabilities. But how, you ask?

We’ll do a technical deep dive into the mechanics of how the ember-service-worker ecosystem utilizes plugins. Along the way we’ll investigate the addon lifecycle and broccoli customizations. Finally we’ll touch on the unique problems of testing such addons.


About our sponsors:

RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA's award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.