Over the last years, many customers have had to deal with cyber attacks targeted at intellectual property. We have entered a new phase in which criminals unleash destructive attacks, rendering IT environments unusable and effectively halting business. Consumerization of IT and the cloud add inherent tension and security implications to this new reality. How can one deal with data that moves in and out of your datacenters, to unmanaged devices and cloud services not directly under your control? How can you create a cost efficient architecture and plan for prevention, detection, and recovery in a time where cloud and consumerization of IT are high on every CxO's agenda? The presenters of this session have been on the Targeted Attack frontline with enterprise customers over the last years. They explain the threats of targeted attacks and share an architecture model using a data classification model, as well as their field experiences and services you can leverage to deal with prevention, detection and recovery.
The first major decision when planning for a Lync deployment is how to deploy Microsoft Lync: as Lync Server 2013 on premises, or Lync Online with Microsoft Office 365 in the cloud. This first decision will shape service quality, resiliency, and resource optimization in your deployment. This session goes over the differences between "on-premise," hybrid, and "on-line" solutions and details situations where each would be optimal for your deployment. Finally, this session covers hosted solutions, the interoperability between Lync and Office 365, and offers guidance in preparing for a potential migration to the cloud.
Опыт проектирования взаимодействия в инсталляциях. Решения с использованием Kinect и других девайсов. Какие подходы работают на какой аудитории. Где интерфейс удобен, а где кроме WOW-эффекта от него никакого толка.