In this session Michael will talk about what types of cloud services are available and what their functions are. The differences between worker roles and instances of these services will be looked at. How these instances can be effectively scaled up or down depending on business need will also be covered. Role life cycle, service configuration and diagnostics will be discussed as well as different approaches to upgrading and deployment of the services.
Speaker: Michael West Sr Lead Consultant Catapult Systems
Visual Studio Online Application Insights solves the age-old problem of collecting enough data to enable developers to diagnose their issues but not so much as to impact production capacity. In this video, we'll focus on setting up Application Insights and Microsoft Monitoring Agent in connected scenarios. In these scenarios, Application Insights will monitor event data, analyze it for categories of issues, display (down to the specific line of code) the source of the issue, monitor memory usage for leak detection and output memory snapshots and IntelliTrace logs that can be analyzed using Visual Studio 2013.
In this session, Noah will present an overview of Virtual Machines and Web Sites in Azure. He will cover how to create and manage virtual machines as well as cover the migration of VM's between on-premise and cloud-based hosting. Noah will also discuss Azure Web Sites, including a demo of creating a new Web Site and deploying a simple application.
Speaker: Noah Benedict Managing Consultant Catapult Systems
With the proliferation of mobile devices as well as the flexibility of delivering mixed topology implementations of Lync, Exchange and other dependent systems, optimizing your security architecture has never been more important. Derek and team will cover: _x000D_ _x000D_ Security Framework: Confidentiality, Integrity and Availability _x000D_ Telecom and network security best practices _x000D_ Trends in authentication: Mobile devices, 2-Factor Authentication _x000D_ Encryption TLS and sRTP_x000D_ Resilient certificate management _x000D_ Mitigating the risk of denial of Service attacks _x000D_ Basic steps for protecting against minute theft _x000D_ Real life edge and reverse proxy scenarios_x000D_