Security and Compliance are two of the biggest concerns for businesses who are looking to migrate workloads to the public cloud. Businesses can take advantage of Configuration Manager 2012 R2 (ConfigMgr) and Security Compliance Manager (SCM) to keep their Azure VMs in 'green' state while reducing the attack surface and security risks of their VMs. In this session we'll take a look at how to secure your Azure VMs using Endpoint Protection, maintain patch level using ConfigMgr 2012 R2 and how to meet your security compliance requirements using SCM and ConfigMgr Compliance Settings. Presenter: Andreas Wasita (Kloud)_x000D_
Graphically intensive user interfaces are growing increasingly more common in modern apps, and on the Windows platform, DirectX is a key enabler for this trend. Whether you use DirectX to create an interactive UI for a Windows Store app or to build a 3D game, having the right tools will make your job easier. In this video, we take a tour of what’s new in Visual Studio 2013 for building DirectX apps, including refreshed project templates, samples and feature additions to Graphics Diagnostics.
By definition, an app written on the Universal Windows Platform can run across many Windows device families, but this covers an extremely wide range of different hardware capabilities (especially to memory and CPU). If you want your app to be successful on all devices, you need to pay attention to these variations, and tune your app’s features dynamically. This talk will explain how the system applies memory and CPU resource policy, and provides insights into the underlying rationale and internal mechanisms. We’ll also see how the new API surface gives you the tools to make your app successful in the face of widely varying hardware constraints. Speaker: Andrew Whitechapel.
With the bad guys now targeting phones, tablets, and other mobile devices, it’s important to know how to protect against hackers, thieves, and misfits. Join Andy Malone and learn more known hacker techniques on mobile devices and preventive methods such as encryption, tracking and forensics; and who is responsible for security protecting data within your organization.