Stale Hansen, the creator of Get-UnusedNumbers PowerShell script, walks through how phone number management is done throughout different Lync deployments. The session starts with some of the basics and quickly moves over to more advanced scripting and tools that can be utilized in user creation workflows and user management scenarios. Be sure to attend this session if you want tips on phone number management in your environment or customer deployments.
The third installment in our series on Software Defined Networking (SDN) with Lync continues with an exploration of Quality of Service. In this session we'll explore how UC as an end-user application can automatically program a SDN environment so that the network can self-adapt and provision itself to maximize the performance of real-time traffic like voice and video. Together with our partner HP Networking, you'll get to see exactly how Lync and the network work together to provide optimal quality across the enterprise network.
While not a tool designed specifically for network or enterprise security, Configuration Manager (ConfigMgr) 2012 can certainly be used as part of an overall strategy in securing an environment (large or small). With the rise of publicly disclosed breaches, "security" should be at the top of every IT engineer's and administrator's list because everyone is either part of the solution or is part of the problem. This session will explore what's built into ConfigMgr to help secure an environment and will also present some semi-custom solutions, ideas, and options (including leveraging other tools) that can make ConfigMgr a valuable tool in the fight to secure an environment against those evil-doers.