Multimedia Library - Video

Mar 3, 2015
Education

Session 2: Insuring Successful Business Data Delivery with Service Broker  

Presented by: Allen White Running Time: 69 minutes How your business applications interact with the corporate database directly can have a dramatic impact on how successful you are, and one of the biggest issues is performance with large databases. By designing the application to use asynchronous messaging for non-critical updates you can focus performance concerns to where the timeliness is critical. SQL Server Service Broker handles the asynchronous requests quickly and efficiently, and minimizes the conflicts with your critical updates. This session will walk you through the steps to get Service Broker up and running and provide a consistent delivery of your business data....More
Mar 3, 2015
Education

Session 3: Protecting the Edge  

Presented by: Liam Cleary | Running Time: 62 minutes The web components of SharePoint make up what you as the end user see and interact with. In order to make this function as expected there are many layers of endpoints such as web services that need to be exposed. Too often these are left for anyone to see. Often security has been applied incorrectly and users are allowed to access content that they shouldn't be able to or need to access. In this session we will review core security approaches and learn how to check that security is done correctly....More
Mar 3, 2015
Education

Session 3: Using Service Broker to do ETL from an OLTP Database  

Presented by: Allen White Running Time: 67 minutes Most of the time you'll see Extract, Transform, Load (ETL) being done with a tool such as SSIS, but what if you need near-real time reporting? This session will demonstrate how to keep your data warehouse updated using Service Broker messages from your OLTP database....More
Mar 3, 2015
Education

Session 1: Exploring the SSIS Catalog  

Presented by: Tim Mitchell | Running Time: 65 minutes In this session, we will walk through the SSIS catalog: its moving parts, the deployment story, and day-to-day management. We will examine how packages are stored in the catalog, how package configurations have changed (for the better!), and what takes place during a package execution. Much of this presentation will be demo-based, so you'll get to see all of these moving parts in action....More
Mar 3, 2015
Education

Session 1: Core Platform Security  

Presented by: Liam Cleary | Running Time: 61 minutes SharePoint as a product is made up of many smaller components, as well as other systems that connect into or are a part of the ecosystem. In this session we will look at core topology design and work through the security implications that could be present. We will delve into attacking the core surrounding platforms to attempt to gain access to SharePoint....More
Mar 3, 2015
Education

Session 2: The SSIS Execution Life Cycle  

Presented by: Tim Mitchell | Running Time: 65 minutes In this session, we'll cover the life cycle of a package post-deployment. Specifically, we'll address the different ways in which packages may be executed from the SSIS catalog, monitoring in-progress packages, and proper logging techniques. This presentation will be mostly demo, so attendees will get a driver's seat perspective on what is involved in managing packages deployed to the SSIS catalog....More
Mar 3, 2015
Education

Session 1: Demystifying Asynchronous Messaging  

Presented by: Allen White | Running Time: 69 minutes Service Broker is seldom used because it isn't well understood. In this session, Allen will walk you through the basics of Service Broker, including the components involved in getting messages sent from one place to another. He will talk about both normal and external activation, where an application – rather than a stored procedure – receives and processes the messages, and he'll discuss strategies to handle various problems like poison messages....More
Mar 3, 2015
Education

Session 2: All about the Database  

Presented by: Liam Cleary | Running Time: 58 minutes The database is the core to a SharePoint platform. It stores all of the configuration and content that can be very private and confidential for an organization. In this session we will review security approaches for SQL Server, and then try to break into SQL and perform escalation attacks to gain access to SharePoint....More
Mar 3, 2015
Education

Session 3: Managing Security in SSIS  

Presented by: Tim Mitchell | Running Time: 62 minutes In this session, we'll cover the essentials of securing the SSIS catalog. We will walk through security of individual packages, including package/project protection levels. We will cover the configuration story, and demonstrate how to properly secure sensitive information (such as connection strings) outside of the package. Finally, we will discuss and demonstrate security in the catalog itself, including management of who can (and cannot) browse, edit, and execute packages....More
Jul 23, 2014
Education

Session 2: Optimizing SQL Server Performance in a Virtual Environment  

Running Time: 60 minutes | In this session, we'll look over what you should look at within your virtual environment to ensure you are getting proper performance. This will include how to look for CPU performance issues at the host level. We'll also discuss the Memory Balloon drivers – what they do, how you should configure them, and why. We'll discuss memory sharing technologies, which are built into vSphere and Hyper-V, and how they relate to SQL Server. Then we'll will finish with some storage configuration options....More

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×