If you are considering Microsoft Office 365 you need to understand what compliance features and capabilities are available. These features may replace existing compliance functionality or create new opportunities to meet compliance obligations. This session will explore features and capabilities, such as data retention, data leakage protection and discovery and demonstrate usage in the Australian setting. The information presented is this session will help you navigate an organisational journey to Microsoft Office 365 by providing knowledge and examples to smooth the transition, whilst maintaining or enhancing regulatory compliance.
Entity Framework is Microsoft's recommended data access technology for new applications in .NET. We'll explore how the current release of Entity Framework can be used to build applications. We'll also look at an early preview of EF7, a modern, lighter weight, and composable version of Entity Framework (EF) that can be used on a variety of platforms, including ASP.NET vNext, Windows Phone and Windows Store. This new version will also support targeting non-relational data stores.
Identity which of your applications and services are critical in your on-premises environment. Leverage your investment in Active Directory (and other directories) and setup a synchronization with Azure Active Directory to simplify authentication in this Cloud world. You will learn what capabilities each offering has as well as how to configure them to be used for single sign on with over 2000+ Software-As-A-Service offerings like Office365, Salesforce, DropBox enterprise and more.
While not a tool designed specifically for network or enterprise security, Configuration Manager (ConfigMgr) 2012 can certainly be used as part of an overall strategy in securing an environment (large or small). With the rise of publicly disclosed breaches, "security" should be at the top of every IT engineer's and administrator's list because everyone is either part of the solution or is part of the problem. This session will explore what's built into ConfigMgr to help secure an environment and will also present some semi-custom solutions, ideas, and options (including leveraging other tools) that can make ConfigMgr a valuable tool in the fight to secure an environment against those evil-doers.