Доклад посвящен набору компонентов Power BI для самостоятельной аналитике. Рассматривается облачный вариант решения (в составе Office 365) в составе компонентов Power Query, Power Pivot, Power View, Power Map. В качестве демонстрационного примера по анализу ценных бумаг показано извлечение данных из Hadoop для Azure и их комбинирование со статистическими данными из Windows Azure Marketplace.
Cloud hosting and geo-distribution take the problems that cause the "it works on my machine" phenomenon to a whole new level. In this video, we'll show you how to set up Visual Studio Online Application Insights to tell you whether your application is available, and if it's performing well, in the four corners of the earth, so that you can resolve issues before your customers even know they exist.
Mobile app development has really exploded over the past few years. And with that, so have the number of options available to developers. Developers are looking for ways to maximize code reuse while being able to deploy to multiple platforms. In this session, David Totzke and Lori Lalonde talk about cross platform development, and the options available to developers - PhoneGap, Appcelerator's Titanium, Telerik's AppBuilder, Sencha Touch, and Xamarin, to name a few.
Over the last years, many customers have had to deal with cyber attacks targeted at intellectual property. We have entered a new phase in which criminals unleash destructive attacks, rendering IT environments unusable and effectively halting business. Consumerization of IT and the cloud add inherent tension and security implications to this new reality. How can one deal with data that moves in and out of your datacenters, to unmanaged devices and cloud services not directly under your control? How can you create a cost efficient architecture and plan for prevention, detection, and recovery in a time where cloud and consumerization of IT are high on every CxO's agenda? The presenters of this session have been on the Targeted Attack frontline with enterprise customers over the last years. They explain the threats of targeted attacks and share an architecture model using a data classification model, as well as their field experiences and services you can leverage to deal with prevention, detection and recovery.