Acquiring and analyzing physical memory as done by forensics professionals is a skill crucial to understanding how an operating system works or worked during the incident. For hobbyists, working with memory can be useful to perform troubleshooting and understand how certain solutions work. Just as it is crucial to understand operating system internals and security aspects, it is equally critical to understand what's in the operating system's memory. The valuable content contains evidence of user actions, hacker's tasks, malicious code behaviors, and the story of what happened on a system. During this session Paula explains and shows the techniques for memory acquisition, techniques for grabbing the juicy data, and why it is so amazing to find someone's memory dump! This session is really intense but practical at the same time, as always it is packed with a lot of live demos and stories!
Mark Russinovich will share his vision on what Azure is today and where Microsoft is taking it in the future. As one of the most trusted Technical Fellows at Microsoft and with his new role as CTO for Azure, Mark has a unique perspective of how Azure is architected and what individuals can do to get the most out of this platform.
Note: at [12:20] we referenced DataStax being on Hadoop. In actual fact DataStax is based on Apache Cassandra (http://cassandra.apache.org/), an open source NOSQL distributed database management system, highly optimized for clusters spanning multiple datacenters, with asynchronous masterless replication allowing low latency operations for all clients.