In this session we will take a look at some of the key considerations when we think about configuring the Hyper-V guests. We'll take a look at aspects such as memory configuration, virtual hard drives and more.
In preparation for the event, we recommend that you download the free, full-featured version of Microsoft Hyper-V Server 2012 R2 as well these other free evaluations available for download:
The rise of public cloud computing has brought with it a new set of security considerations that are not widely understood. With a unique perspective from working on the security systems of a public cloud, Mark describes public cloud service provider and cloud customer threats, including malicious insiders, shared technology, data breaches, and data loss. For each, he assesses the risks and explores the value of mitigations like encryption-at-rest, encryption-in-flight, and other security best practices, separating hype from reality so that you can make educated decisions as your organization moves to the cloud.