Who better than Corey Sanders to take us through the nuts and bolts of what Azure IaaS is and how it works for IT professionals. Corey leads the team that designed and created Azure IaaS and is very passionate about all that it can do. He will move rapidly from the fundamentals to advanced configurations and how to use and interact with your environment.
This week at WinHEC, we were able to talk to silicon, hardware, and device partners about the advances we are making in Windows 10 to simplify building Windows devices, drivers, and apps. This talk covered the key advances we disclosed this week, which include:
The Windows 10 device platform allows IHVs to develop a single universal driver that can be deployed across all Windows 10 device families (e.g. PCs, phones, IoT).
The Windows 10 device platform provides new tools and techniques to reduce the cost and complexity of imaging and manufacturing Windows 10 devices.
In-market and new hardware development boards will support Windows 10 and Windows universal drivers.
Windows 10 will include a new IoT edition for small devices that is tuned to run Windows universal apps and drivers and is royalty free to makers and device builders.
Windows app packaging and deployment just got even better. Come learn how! In this session, learn about the packaging, deployment, and storage features available in Windows 8.1 Update for Desktop and Phone. You’ll leave with an understanding of what these features mean for your Windows Phone SilverLight apps and Windows XAML Windows Store and how to leverage them, and how they benefit your end-users.
Over the last years, many customers have had to deal with cyber attacks targeted at intellectual property. We have entered a new phase in which criminals unleash destructive attacks, rendering IT environments unusable and effectively halting business. Consumerization of IT and the cloud add inherent tension and security implications to this new reality. How can one deal with data that moves in and out of your datacenters, to unmanaged devices and cloud services not directly under your control? How can you create a cost efficient architecture and plan for prevention, detection, and recovery in a time where cloud and consumerization of IT are high on every CxO's agenda? The presenters of this session have been on the Targeted Attack frontline with enterprise customers over the last years. They explain the threats of targeted attacks and share an architecture model using a data classification model, as well as their field experiences and services you can leverage to deal with prevention, detection and recovery.