IT/Dev Connections

ImageNamesort iconPriceAdd to cart
Debugging the Web with Fiddler - On Demand

Presented by Ido Flatow

Every web developer needs to see what goes on "in the wire," whether it is a jQuery call from JavaScript, a Windows Communication Foundation (WCF) service call from a client app, or a simple GET request for a web page. With Fiddler, the most famous HTTP sniffer, this is simple enough to do. Fiddler is more than just a sniffer.

Deploying Your Office in the Cloud with Office 365 - On Demand

Presented by Adnan Hendricks

Office 365 ProPlus wows us by introducing Click-to-Run installation. In this session, you'll dive into the deployment of Office 365 ProPlus. You'll also look at the Office management features to keep track of ProPlus deployment health.

Developing Search Applications in SharePoint 2013 - On Demand

Presented by Matthew McDermott

This session looks at what developers can do with the SharePoint Search API to create custom search applications. Whether your goal is to enhance the SharePoint Search center or create custom search applications that take advantage of SharePoint’s powerful search engine, this session offers tools and techniques to help you build the solution and get the most from SharePoint Search.

Efficient Interval Management in SQL Server - On Demand

Presented by Itzik Ben-Gan

This session explains the existing optimization problems, presents solutions for those problems that can be applied in SQL Server, and describes the potential for additions to SQL Server that could improve interval treatment in the future.

Encryption in SQL Server - On Demand

Presented by Steve Jones

Securing your data is becoming increasingly important for data professionals. This session will cover the encryption features available in SQL Server to help you better secure data. Transparent Data Encryption, symmetric keys, asymmetric keys, and hashing functions will be covered in a number of demos.

Exchange ActiveSync: Taming the Beast - On Demand

Presented by Steve Goodman and Michael Van Horenbeeck

ActiveSync is the Exchange Server technology that keeps people connected. However, it's not without problems. In this session, find out how to better manage your ActiveSync estate, how mobile device management solutions can help, and what improvements Exchange Server 2013 brings to mobile device access.

Exchange Online: Real-World Migration Challenges and Solutions - On Demand

Presented by Steve Goodman

Make sure your migration to Exchange Online is a success. In this session, we will look at the options available when migrating, and we'll examine the technical challenges you'll need to overcome depending on which route you choose.

Exchange Server 2013 Unified Messaging Deep Dive - On Demand

Presented by Paul Robichaux

The architectural and feature changes in Exchange 2013 extend across all of the server roles from previous versions. The Unified Messaging (UM) role is gone, but its features live on. In this session, UM expert Paul Robichaux will guide you through the architectural changes that split UM functionality between the Mailbox and Client Access server roles, discuss feature improvements and changes in the 2013 version of UM, and highlight how to design a cost-effective and efficient UM system to get Exchange voicemail and telephone answering deployed for your users.

Exploring Domain-Driven Design Implementation Patterns in .NET - On Demand

Presented by Stephen Bohlen

Domain-driven design (DDD) is a pattern language for effectively managing complexity in software solutions. DDD has evolved as an approach for conceptualizing a project's problem-space, but as software developers, we're also interested in translating the DDD patterns to code. If you've always wanted to know how to get started with using DDD in your projects, this is the talk for you.

How Does Microsoft Secure My Email with Office 365? - On Demand

Presented by Loryan Strant

This session explains in detail the lengths that Microsoft goes to in order to ensure that customers' emails are kept secure and private. We will review the physical and logical security measures taken, acts and regulations complied with, and overall privacy of Exchange Online.

Your Shopping Cart

Sponsored Introduction Continue on to (or wait seconds) ×