Multimedia Library

rss All Multimedia (387) Audio (7) Gallery (14) Video (366)
Mar 3, 2015
Education

Session 1: Demystifying Asynchronous Messaging  

Presented by: Allen White | Running Time: 69 minutes Service Broker is seldom used because it isn't well understood. In this session, Allen will walk you through the basics of Service Broker, including the components involved in getting messages sent from one place to another. He will talk about both normal and external activation, where an application – rather than a stored procedure – receives and processes the messages, and he'll discuss strategies to handle various problems like poison messages....More
Mar 3, 2015
Education

Session 2: All about the Database  

Presented by: Liam Cleary | Running Time: 58 minutes The database is the core to a SharePoint platform. It stores all of the configuration and content that can be very private and confidential for an organization. In this session we will review security approaches for SQL Server, and then try to break into SQL and perform escalation attacks to gain access to SharePoint....More
Mar 3, 2015
Education

Session 3: Managing Security in SSIS  

Presented by: Tim Mitchell | Running Time: 62 minutes In this session, we'll cover the essentials of securing the SSIS catalog. We will walk through security of individual packages, including package/project protection levels. We will cover the configuration story, and demonstrate how to properly secure sensitive information (such as connection strings) outside of the package. Finally, we will discuss and demonstrate security in the catalog itself, including management of who can (and cannot) browse, edit, and execute packages....More
Mar 3, 2015
Education

Session 1: Power BI Platform: Technical Overview  

Presented by: Jen Underwod | Running Time: 64 minutes In this session, Jen will introduce the Power BI Platform components from a BI professional perspective. She will cover key differences from the prior Power BI release, various BI delivery use cases, and deployment models. Best practices and recommendations also will be shared....More
Mar 3, 2015
Education

Session 2: Creating a Hybrid Exchange Connection Using the Hybrid Configuration Wizard  

Presented by: Michael Van Horenbeeck | Running Time: 66 minutes In this session, we will explore the features of the Hybrid Configuration Wizard and walk through the various steps to successfully configure a hybrid connection and how you can troubleshoot if something fails during the configuration process....More
Mar 3, 2015
Education

Session 3: Multi-Pronged Attacks  

Presented by: Mel Beckman | Running Time: 65 minutes Hackers no longer limit themselves to a single type of attack per victim. Modern attacks are multi-pronged and prosecuted over the course of days or weeks. To defend against these attacks, you must learn to link seemingly unrelated events together and report unusual events to a central security person. The final session explains these processes and how additional business security policies can help formalize them....More
Mar 3, 2015
Education

Session 2: Insuring Successful Business Data Delivery with Service Broker  

Presented by: Allen White Running Time: 69 minutes How your business applications interact with the corporate database directly can have a dramatic impact on how successful you are, and one of the biggest issues is performance with large databases. By designing the application to use asynchronous messaging for non-critical updates you can focus performance concerns to where the timeliness is critical. SQL Server Service Broker handles the asynchronous requests quickly and efficiently, and minimizes the conflicts with your critical updates. This session will walk you through the steps to get Service Broker up and running and provide a consistent delivery of your business data....More
Mar 3, 2015
Education

Session 3: Protecting the Edge  

Presented by: Liam Cleary | Running Time: 62 minutes The web components of SharePoint make up what you as the end user see and interact with. In order to make this function as expected there are many layers of endpoints such as web services that need to be exposed. Too often these are left for anyone to see. Often security has been applied incorrectly and users are allowed to access content that they shouldn't be able to or need to access. In this session we will review core security approaches and learn how to check that security is done correctly....More
Mar 3, 2015
Education

Session 1: Design Wins  

Presented by: Chris McNulty | Running Time: 60 minutes In this session, we'll cover some less well-known settings that can be used to boost system performance across SharePoint – caching, storage tuning, and system settings where a "wrong" choice will reduce performance to a crawl. Security and information architecture have implications for performance as well, and you'll learn how social settings or well-intended collaborative practices can have unintended impact without proper engineering....More
Mar 3, 2015
Education

Session 2: Authoring Power BI Content  

Presented by: Jen Underwood | Running Time: 64 minutes In this session, we will walk through the full BI development lifecycle. We will talk about loading and preparing data with Power Designer from enterprise data sources. Then we will develop reports and dashboards using Power Designer and the new Power BI site....More

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×