This session demonstrates how a new class of scenarios and user experiences can be enabled by re-imagining solutions using cloud-based technology and Apps for Office. Learn how to make cloud-based line-of-business applications which include Apps for Office in Microsoft Word, Excel, and Outlook, and also how to supplement them with Office 365 SharePoint web sites, Windows Phone 8 apps, notifications, and Azure Web Sites and SQL Databases. See an extremely polished end-to-end demo scenario unfold, related to idea generation, qualification, selection, development, and evaluation. Learn how all the components in the demo are built, what patterns are used to implement them, and have a lot of fun along the way. This session also has a little bit of March Madness flavor baked into it which will provide an entertaining and enlightening experience.
In this session we cover different aspects of Hyper-V Recovery Manager, an enterprise-scale Disaster Recovery solution to provide a single click failover in case of disaster (e.g., automation of overall DR workflow using with sequencing, manual actions, etc. to provide both application and site level DR). We cover the most frequently asked end-point support from our customers: Azure to help save precious CAPEX. Learn how to enable Azure as a Disaster Recovery point in a secure manner and seamless management of failover, failback type activities using Azure IaaS VM. Network connection—back to datacenter and to the clients—is one of the top challenges in setup of your DR infrastructure and we cover how to simplify networking for disaster recovery setup. The session also covers enhancements to the solution for the private datacenter to the private datacenter scenario.
Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!