Essential AI Prompts for Developers | DEM509

Estimated read time 2 min read

Post Content

​ Get any AI to work super hard for you with these 4 prompt techniques. You can use these prompts for pretty much anything, – not just programming.

To learn more, please check out these resources:
* https://aka.ms/build25/plan/AAI_DevAppGitHubCop_Plan
* https://aka.ms/VSCode/LearnAgentMode
* https://aka.ms/VSCode/Insiders
* https://aka.ms/get-copilot

𝗦𝗽𝗲𝗮𝗸𝗲𝗿𝘀:
* Burke Holland

𝗦𝗲𝘀𝘀𝗶𝗼𝗻 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻:
This is one of many sessions from the Microsoft Build 2025 event. View even more sessions on-demand and learn about Microsoft Build at https://build.microsoft.com

DEM509 | English (US) | Developer Tools & .NET

Related Sessions:
BRK102 — https://build.microsoft.com/sessions/BRK102?wt.mc_id=yt_PLlrxD0HtieHgzfZCDP1dYD-AvB7zrQ7O2
BRK108 — https://build.microsoft.com/sessions/BRK108?wt.mc_id=yt_PLlrxD0HtieHgzfZCDP1dYD-AvB7zrQ7O2
BRK124 — https://build.microsoft.com/sessions/BRK124?wt.mc_id=yt_PLlrxD0HtieHgzfZCDP1dYD-AvB7zrQ7O2
DEM519 — https://build.microsoft.com/sessions/DEM519?wt.mc_id=yt_PLlrxD0HtieHgzfZCDP1dYD-AvB7zrQ7O2

#MSBuild

Chapters:
0:00 – Shift of Preference from Theatre A to Theatre B
00:01:09 – Introduction to the Q&A Prompt Method
00:02:25 – Discussion on Middleware Inclusion and API Endpoints
00:03:32 – Request for Script Generation
00:06:02 – Database File Injection Request
00:06:28 – Exploring Different Implementation Methods
00:09:47 – Sequel Injection Vulnerability and Parameterized Queries
00:10:40 – Implementing Prisma as a Necessary Step
00:11:03 – Using Unique Keywords in Code   Read More Microsoft Developer 

You May Also Like

More From Author