Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system.
During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
When building solutions for the Cloud it is critical to understand that every architecture decision has even more impacts than before as a bad code might get you out of business. For this reason in this session we will be focusing on:
Breaking down the baseline concepts of Cloud design
Defining the critical considerations which we should have when designing new Cloud solutions
Looking at Architectural Patterns which can help us succeed in this space, like Microservices, CQRS and Event Sourcing
Looking at real life examples of Azure Cloud Architectures, the trade-offs and results
Lessons Learned Building Azure Solutions
The key goal of this session is to create awareness of what considerations, architectural patterns and trade-offs should be done in order to have successful Cloud solutions and even more specific to Azure solutions.