You might have heard about containerization technologies like Docker that allow you to achieve greater density and better performance than traditional full-fledged IaaS Virtual Machines. We recently announced support for Docker on Azure and all the goodness that it brings to your solutions. How should an IT Implementer / SysAdmin deploy and leverage this new technology? This session will tell you everything you need to know.
While not a tool designed specifically for network or enterprise security, Configuration Manager (ConfigMgr) 2012 can certainly be used as part of an overall strategy in securing an environment (large or small). With the rise of publicly disclosed breaches, "security" should be at the top of every IT engineer's and administrator's list because everyone is either part of the solution or is part of the problem. This session will explore what's built into ConfigMgr to help secure an environment and will also present some semi-custom solutions, ideas, and options (including leveraging other tools) that can make ConfigMgr a valuable tool in the fight to secure an environment against those evil-doers.