Multimedia Library - Video

Sep 15, 2015
Video

Developing Actionable Analytics for Mobile Devices  

In this session we'll walk through common challenges, considerations, tips, tricks, and best practices for designing mobile dashboards. Be sure to bring your own tablet or smartphone to this session to participate in live demos....More
Sep 15, 2015
Video

Improving Your Web Application Performance  

You'll get answers to such questions in this workshop. We'll cover IIS, ASP.NET (Web Forms/MVC/Web API), .NET, JavaScript, and general WebDev tips that will make your clients thank you when you deploy your next version....More
Sep 15, 2015
Video

Writing Secure Authentication Code with OAuth2 and the Office 365 APIs  

This session examines three different styles of authentication with OAuth2 including Implicit Grant, Authorization Code Grant and Client Credentials Grant and takes the time to explain how to pick the most appropriate authentication style given the type of application you are building....More
Sep 14, 2015
Video

Data Mining in Configuration Manager 2012 and SQL Server Refresher  

Speaker: Steve Thompson One of the challenges in creating reports for ConfigMgr 2012 R2 is finding the information you need in the SQL Server database. This session will focus on locating the data you need; along with tips and tricks for creating SQL queries....More
Sep 14, 2015
Video

How to Extend the App Model to Support Your User-Centric XenDesktop in the Data Center  

Speaker: Peter Daalmans / Kenny Buntix Learn how Configuration Manager 2012 R2 sits at the heart of your modern data center and how Configuration Manager 2012 can be extended with Citrix Connector 7.5, which allows you to not only manage your Citrix XenDesktop or XenApp farms but also use the extended Application Model. In this session you'll learn how to use the Citrix Connector to manage, deploy, and make your applications available on any device, anytime and anywhere....More
Sep 14, 2015
Video

Malware Hunting with the Sysinternals Tools  

Speaker: Michael Wiley This session will provide an overview of several Sysinternals tools, including Process Monitor, Process Explorer, and Autoruns, focusing on the features useful for malware analysis and removal. These utilities enable deep inspection and control of processes, file system and registry activity, and autostart execution points. We'll demonstrate their malware-hunting capabilities by presenting several current real-world malware samples and using the tools to identify and clean malware....More
Sep 14, 2015
Video

Preparing for a Faster Microsoft OS Release Cycle  

Speaker: Orin Thomas With the release of Windows 10, Microsoft is changing the operating system release cycle, going from monolithic releases every few years punctuated by service packs to providing organizations with the option of sticking with a long-term stable branch or a more frequently updated branch. The process of updating operating systems is being simplified, so that it's not nearly as traumatic on IT staff or end users....More
Sep 14, 2015
Video

Underutilized Configuration Manager Features  

Speaker: Wally Mead There are a ton of great features in Configuration Manager 2012. But are you using all of them? And more importantly, for those you are using, are you using them appropriately? In this session we'll discuss the features in Configuration Manager 2012 that are often not used, or not used appropriately, and discuss the benefits of using them....More
Sep 14, 2015
Video

Why Your Company Needs a Cloud-Based Identity  

Speaker: Simon May Everyone is mobile today. People in your organization are accessing their information from anywhere and everywhere thanks to some fundamental shifts in work behavior. In addition, IT is no longer in control of every single software decision; now, the sales director, the Chief Marketing Officer, and Joe in the accounting department all make decisions without a single thought about the company's standard operating environment. As a result, you need user names and passwords for 10, 20, 30, or 1000 different systems!...More
Sep 14, 2015
Video

Windows Server vNext BranchCache and Deduplication Deep Dive  

Speaker: Phil Wilcock Want to know the inner workings of the deduplication and BranchCache algorithms and how you can benefit from using them? In this session we'll cover what BranchCache does, what it can do with some glue, and what it will never do. Then we'll take an in-depth look at deduplication and some cool solutions that you can build around these technologies....More

Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×