Multimedia Library - All

Exchange Exposed
Jun 17, 2015
Commentary

Exchange Exposed #4: Exchange 2016 and the future of on-premises IT

In this episode, Paul and Tony meet (over a transatlantic connection) to explore the latest developments in the world of on-premises and cloud Exchange with their guest, Justin Harris of Binary Tree....More
Exchange Exposed
Apr 17, 2015
Commentary

Exchange Exposed #3: Contemplating compliance

In this episode, Paul and Tony review the latest happenings in the world of Exchange and look forward to what they think might happen at the Microsoft Ignite event in May. They are joined by Kamal Janardhan of Microsoft to talk about how the compliance features are evolving in Exchange and in the new Office 365 Compliance Center....More
Mar 3, 2015
Education

Session 1: Demystifying Asynchronous Messaging  

Presented by: Allen White | Running Time: 69 minutes Service Broker is seldom used because it isn't well understood. In this session, Allen will walk you through the basics of Service Broker, including the components involved in getting messages sent from one place to another. He will talk about both normal and external activation, where an application – rather than a stored procedure – receives and processes the messages, and he'll discuss strategies to handle various problems like poison messages....More
Mar 3, 2015
Education

Session 2: All about the Database  

Presented by: Liam Cleary | Running Time: 58 minutes The database is the core to a SharePoint platform. It stores all of the configuration and content that can be very private and confidential for an organization. In this session we will review security approaches for SQL Server, and then try to break into SQL and perform escalation attacks to gain access to SharePoint....More
Mar 3, 2015
Education

Session 3: Managing Security in SSIS  

Presented by: Tim Mitchell | Running Time: 62 minutes In this session, we'll cover the essentials of securing the SSIS catalog. We will walk through security of individual packages, including package/project protection levels. We will cover the configuration story, and demonstrate how to properly secure sensitive information (such as connection strings) outside of the package. Finally, we will discuss and demonstrate security in the catalog itself, including management of who can (and cannot) browse, edit, and execute packages....More
Mar 3, 2015
Education

Session 1: Power BI Platform: Technical Overview  

Presented by: Jen Underwod | Running Time: 64 minutes In this session, Jen will introduce the Power BI Platform components from a BI professional perspective. She will cover key differences from the prior Power BI release, various BI delivery use cases, and deployment models. Best practices and recommendations also will be shared....More
Mar 3, 2015
Education

Session 2: Creating a Hybrid Exchange Connection Using the Hybrid Configuration Wizard  

Presented by: Michael Van Horenbeeck | Running Time: 66 minutes In this session, we will explore the features of the Hybrid Configuration Wizard and walk through the various steps to successfully configure a hybrid connection and how you can troubleshoot if something fails during the configuration process....More

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×