While not a tool designed specifically for network or enterprise security, Configuration Manager (ConfigMgr) 2012 can certainly be used as part of an overall strategy in securing an environment (large or small). With the rise of publicly disclosed breaches, "security" should be at the top of every IT engineer's and administrator's list because everyone is either part of the solution or is part of the problem. This session will explore what's built into ConfigMgr to help secure an environment and will also present some semi-custom solutions, ideas, and options (including leveraging other tools) that can make ConfigMgr a valuable tool in the fight to secure an environment against those evil-doers.
Join this session to learn about the best techniques to derive business insights using Microsoft BI tools connecting to the SAP ERP and SAP BI Platform. We outline best approaches to connect to the SAP business system including SAP ECC, CRM, Business Warehouse (BW) and SAP BI Platform using Microsoft Excel 2013 and SharePoint BI platform. We also talk about SAP Net weaver Gateway to consume all sorts of SAP-generated data via OData feeds. Fifty percent of the session will be live demos of Microsoft BI connecting the SAP system.
Cloud hosting and geo-distribution take the problems that cause the "it works on my machine" phenomenon to a whole new level. In this video, we'll show you how to set up Visual Studio Online Application Insights to tell you whether your application is available, and if it's performing well, in the four corners of the earth, so that you can resolve issues before your customers even know they exist.