While not a tool designed specifically for network or enterprise security, Configuration Manager (ConfigMgr) 2012 can certainly be used as part of an overall strategy in securing an environment (large or small). With the rise of publicly disclosed breaches, "security" should be at the top of every IT engineer's and administrator's list because everyone is either part of the solution or is part of the problem. This session will explore what's built into ConfigMgr to help secure an environment and will also present some semi-custom solutions, ideas, and options (including leveraging other tools) that can make ConfigMgr a valuable tool in the fight to secure an environment against those evil-doers.
As developers, we are asked to absorb even more information than ever before. More APIs, more documentation, more patterns, more layers of abstraction. Now Twitter and Facebook compete with Email and Texts for our attention, keeping us up-date-to-date on our friends dietary details and movie attendance second-by-second. Does all this information take a toll on your psyche or sharpen the saw? Is it a matter of finding the right tools and filters to capture what you need, or do you just need to unplug. Is ZEB (zero email bounce) a myth or are there substantive techniques for prioritizing your live as a developer?