Publishing Exchange used to be easy. You installed Microsoft Security and Acceleration (ISA) Server or Forefront Threat Management Gateway (TMG) and considered your work done. But with the changes in roadmap of Microsoft security products such as TMG and UAG, and the addition of features like ARR and WAP, the sea of TLAs has become more complex than ever. Come and learn what the real risks are when publishing Exchange to the Internet, what your choices are, which you should choose, and how to deploy them. There's a TLA for everyone when it comes to publishing Exchange, but make sure you know which is which and which one you need, if at all. The Windows team have added an additional component called Application Request Routing 3.0 to the Internet Information Service (IIS) role, which enables IIS to handle reverse proxy requests and also perform layer seven Load Balancing of these requests.
Microsoft Azure offers many new business scenarios and solutions that are difficult to implement using traditional corporate environments. One of the most dynamically developing approaches is the concept of Big Data. When we talk about Big Data, everyone understands it differently. Despite this, everyone would probably agree that we are talking about large volumes of data. From this report, you will learn about different ways to use Microsoft Azure in this context.
Learn how to leverage Windows PowerShell Desired State Configuration to operationalize “DevOps” capabilities on Azure. We start with the basics of PowerShell DSC working through the basic architecture, example uses and preventing “configuration drift.” We review DevOps principles and then apply those principles using PowerShell DSC over Azure to enable continuous deployment.