The third installment in our series on Software Defined Networking (SDN) with Lync continues with an exploration of Quality of Service. In this session we'll explore how UC as an end-user application can automatically program a SDN environment so that the network can self-adapt and provision itself to maximize the performance of real-time traffic like voice and video. Together with our partner HP Networking, you'll get to see exactly how Lync and the network work together to provide optimal quality across the enterprise network.
The Lync Call Quality Methodology (CQM) is a practical approach that applies the broad guidance we have published in the Lync Networking Guide. CQM is a data driven framework backed by SQL queries and an operational process to systematically improve and maintain call quality. CQM was derived from Microsoft and some of our largest customer deployments. CQM was published in v2 of the Networking Guide complete with queries and an updated set of 2010/2013 KHIs. This session will go through the individual components of CQM, describe our recommended process for implementing it, show findings from using CQM and go into detail on how the SQL queries work and how you can customize them for you or your customer's needs.
When designing cloud applications, you should take into account the fact that a failure or malfunction of any component of the system is possible. This template is called Designing for Failure. This design approach helps minimize the negative consequences of failure of any component of the internal or external system. Sometimes, it is not so simple to use the Designing for Failure template, but the Azure platform greatly facilitates this task due to the fact that some of the functions are implemented by cloud services—Azure Web Sites, Traffic Manager, CDN, RA—Geo Redundant Storage. During this session, we shall talk about how to use the functionality provided by Azure to ensure the accessibility of a website, even in the event of failure of one of the regions of the platform.
С каждой новой версией ОС Microsoft добавляет новые механизмы безопасности такие как DEP, SEHOP, ASLR. Злоумышленники так же не стоят на месте. Они понимают, что атаковать ОС становится всё сложнее, поэтому фокусируют свои атаки на приложениях. Вы узнаете, как создавать модели угроз и предсказывать следующие шаги злоумышленников, как разрабатывать приложения так, чтобы надежно защитить их и обеспечить безопасность и защиту частной жизни ваших клиентов.