Organizational customers want consistent identities and access control across Active Directory (AD) and the software-as-a-service apps they rely upon, including Microsoft Office 365, salesforce.com, Box, WebEx, GoToMeeting, Concur, etc. This session covers how customers can enable Azure AD for SSO to hundreds of popular SaaS apps, along with configuring provisioning, federation, and password vaulting, and how to address the typical rollout concerns for enterprise-wide deployment of SaaS single sign-on.
In this session Michael will talk about what types of cloud services are available and what their functions are. The differences between worker roles and instances of these services will be looked at. How these instances can be effectively scaled up or down depending on business need will also be covered. Role life cycle, service configuration and diagnostics will be discussed as well as different approaches to upgrading and deployment of the services.
Speaker: Michael West Sr Lead Consultant Catapult Systems
Application Insights delivers the holy grail of EASILY determining how customers are using your product, what their experience is, the environments your customers are using, and ensuring your applications are successful in meeting your business needs. This data is provided by the usage telemetry capabilities of Application Insights. In this session, discover how easy it is to add this to your existing applications through a simple “right click” option in Visual Studio. Demos include enabling usage telemetry with Application Insights from Windows Phone apps, Windows Store apps, Web applications, as well as custom logging, custom events, and dashboard creation.
Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!