Let's face it, Windows machines can get hijacked if you happen to be on the wrong place at the wrong time. Fortunately, Microsoft has built numerous tools into Windows so administrators and power users can analyze systems to determine whether and how they've been compromised. But many of us are not even take this in to consideration! In this session we'll demonstrate the tools built into Windows for such analysis, as well as more free tools from the Security community to help you out get of chaos! If you have ever had a virus in your PC than attending this session is a must for you.
Why should developers care about IaaS? Think of your Windows Azure Datacenter as an Object Model(OM). "IaaS OM" can help us build cost effective systems by only turning on the parts of system that are needed and when they are needed. Additionally, systems built using IaaS can not only be more fault tolerant but also scale in the direction of business growth. We will begin this session with a review of key Windows Azure IaaS concepts including compute, storage and VNET. Next we will walk the "IaaS OM" using Windows Azure Power Shell SDK, including a discussion of bootstrapping VMs. Finally, we will walk through a collection of IaaS scenarios including virtual branch office, single pane of glass for managing on-premises and Azure based resources and hybrid applications that combine IaaS & PaaS.
In questa sessione saranno discusse le peculiarità dei due principali stack di virtualizzazione (VMware vSphere e Microsoft Hyper-V) partendo dai concetti chiave di ciascun prodotto, dalle diverse funzionalità (e degli equivalenti in ciascun mondo), fino a discutere delle problematiche di conversione Virtual to Virtual (V2V) tra un ambiente e l'altro. Infine saranno discusse alcune soluzioni di gestione e monitoraggio multi-hypervisor.