Telecoms, Media & Technology is part of the Knowledge and Networking Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.
Azure and PowerShell are a big deal, no question about it. However, are you aware that PowerShell capability in Azure IaaS extends well beyond what can be performed with the Azure PowerShell module? This session will detail the many ways in which one can engage with Azure and Azure virtual machines using PowerShell. This session will detail demonstrate the following features: Azure PowerShell Module, Azure VM DSC extensions, Azure VM Custom Script Extension and Azure Automation. We will quickly ramp you up on everything you need to select and use one or many options for Azure VM automation and configuration using PowerShell.
Inevitably, DBAs get asked, "Who made that change?" This is true whether we're talking about schema changes or modifications to data. Usually it's upper management who is screaming for this information, meaning we have to provide it immediately. It gets worse when we've had a data breach and we're trying to determine what the attacker walked away with. In this session, we'll examine where to look inside SQL Server to get answers to the basic questions: who, when, what and possibly how. We'll consider what options you have if nothing has been set up beforehand and then discuss what we can implement proactively to gather this information for when we need it.
Xamarin.Forms is a great framework for building cross-platform apps with tremendous speed, although it does have its limitations. Microsoft has added numerous additions to the platform lately to enable creation of all the experiences that we may desire. In this session, Xamarin MVP Gill Cleeren will take you through the new (and older) approaches to build the UI you want (and need). We’ll cover renderers, effects, behaviors, native control embedding and much more.
The performance of web applications is more important than ever. Bad performance may lead to a lower search engine ranking, a decreased conversion rate—and unhappy users. These are just a few of the many reasons to make front-end performance optimization a mandatory step in your development process. However, advice that was relevant a few years ago is often made obsolete by new browser versions or new technologies like HTTP/2. In this session, we will cover several aspects of optimizing a site from a performance perspective, debunk some decade-old myths and present tools that help analyze a web site's performance.
In this session, Steph Locke, who has spent the past five years operationalizing data science models, will show you a robust framework that'll work with R and Python models using your existing SQL Server implementation. This isn't the only way to do things, but this solution will fit easily into a SQL Server 2016+ database, helping you get models into production quickly and safely. Using SQL Server 2016+ with R/ML Services installed, attendees will use temporal tables and other new features to deploy models, log the results and then monitor using Power BI.
The trusted insider has considerable access to your organization’s sensitive, critical and valuable data. However, since it is extremely difficult to recognize when the insider goes from “trusted” to “malicious,” so much access increases the threat of data theft, fraud and even espionage. Making it even more difficult, the risk of insider threat can move from employee to employee without a clear indication of whom IT should be mindful. How then can you spot an insider threat? In this informative session, join industry expert Nick Cavalancia as he discusses: • Who’s a potential risk: where to place your “insider” focus and when • How to spot the insider threat: what activity should you be monitoring? • Proactively building an Insider Threat Program
Is it possible that SQL Server now runs on Linux? In this session, we’ll cover the details of deploying and running SQL Server on Linux, including Red Hat, SUSE and Ubuntu. We’ll go over the internals of the architecture and the unique aspects of using SQL Server on Linux. Also covered will be how SQL Server has embraced Docker containers, providing new scenarios not seen before with virtual machines, including support for Kubernetes and CI/CD pipelines. The session will be full of demos showing how to make the move to using SQL Server on Linux and Docker containers. If you are a MacBook user and want to run SQL Server with no virtualization or Windows installation, don't miss this session.
In this session, you’ll learn what Microsoft has been up to with Blockchain technology, and how it is innovating in the field to serve customers. You’ll also learn what companies can do to foster and nurture POCs and discoveries in Blockchain technologies. This is a great session for people who don't write code but want to learn about how Blockchain can transform their business—and find out how Microsoft is doing it.
Are you wondering what the future holds for unified endpoint management (UEM)? Then join us for an open discussion on solutions to manage iOS, Android, Mac OS and Windows devices. Share your predictions, and we will share what we have seen in the current market.
Scrum is the most popular Agile framework in the world for effective team collaboration on complex projects. It provides a small set of rules that create just enough structure for teams to be able to focus their innovation but is only optimized for teams of five to nine people. Getting Scrum to work with larger teams or in large enterprise environments brings its own set of challenges. This talk presents three patterns used on enterprise teams to scale Scrum effectively with global teams.
In this session, you will learn security-first principal patterns for architecting enterprise portal solutions using Dynamics 365, Office 365 and enterprise blockchain. See how organizations today are creating a secure framework for customer, partner and employee engagement portals. Learn also patterns for integrating Dynamics engagement portals with Office 365 services, external applications, and private or public blockchains.
Disasters happen. And while companies spend large sums of money and resources planning for them, many still fail miserably when disaster strikes. This session walks through the ins and outs of an actual disaster response and discusses the lessons learned. We’ll also examine technology from Microsoft Azure that can be used to make sure that this scenario doesn't happen to you. Come to this session for an intimate look at what happens when your company doesn't plan for disaster recovery beyond a disk backup.
Session details coming soon.
For any company which operates or intersects with EU citizens in any way (customers, employees, customers who have EU employees, etc), the General Data Protection Regulation (GDPR) will have a significant impact on the way organizations need to build and maintain their applications and application environments. In this session, we are going to look at all of the ways in which applications and their supporting infrastructure needs to be updated to properly support the data privacy concerns of GDPR and similar compliance initiatives.
In this session, you’ll learn how to leverage AWS security best practices to reduce your risk. We will cover AWS built-in optional account configuration as well as external resources to help audit and protect your environment.
Session details coming soon.
Start delivering applications through a web browser with Amazon AppStream 2.0, whether they are basic productivity and business applications or demanding simulation and graphics applications. AppStream 2.0 can deliver multiple Windows applications directly to your end users regardless of their device’s capabilities or operating system. In this session, attendees will gain an understanding of the affordances of application streaming and how to apply a DevOps workflow to traditional desktop/laptop management.
Traditional computer vision approaches can improve the computation cost and quality of deep learning algorithms. This session will provide an overview of hybrid models, computer vision and deep learning together, and will give a deep-dive into a human action detection algorithm.
Session details coming soon.
This session is a deep dive into managing AWS resources using the AWS PowerShell tools and AWS Systems Manager. We’ll begin with simple concepts and progress to cover techniques for controlling and managing fleets of EC2 images and instances, VPC networks and more. We’ll also cover other features of AWS Systems Manager, such as automated patch management and monitoring for both in-cloud and on-premises systems.
Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. The challenges associated with adoption can be mitigated by empowering developers with the appropriate security tools and processes, automation and orchestration. This session will discuss enabling this transformation and the resulting benefits, including the delivery of more secure applications, lower cost of managing your security posture, and full visibility into application and enterprise risks.
3AM, on a Sunday, you should be asleep, but instead you are woken up by a text claiming that "the super-critical app is timing out again". What is happening? Where is it slow? Why is it slow? In this session we will discover the services that Microsoft Azure offers to customers to collect logs and specifically metrics of our cloud workloads. We will understand what metrics we should be interested in when running on a cloud platform and how to get to those metrics. We will learn about open-source tools and will definitely build some nice dashboards. In the end attendees will have the knowledge to start building their own metrics dashboards and next time they are woken up at 3AM they will be able to quickly understand what is happening.
In this session, we'll dive into Privileged Identity Management in Azure Active Directory. Through a combination of PowerPoint and live demonstrations, we will show you how to set up and use PIM to protect your Office 365 tenant from administrators using admin rights without authorization.
This session will demonstrate the basics of how to create serverless applications and microservices using AWS Lambda, Amazon DynamoDB, Amazon API Gateway and other serverless services. During the session, attendees will build an application using standard patterns of creating a small dynamic microservice using Amazon Web Services as cloud provider.
Adoption of cloud and DevOps practices creates new challenges for system administrators and engineers. With features and tools such as ARM templates, PowerShell, PowerShell DSC and VSTS, we can quickly build out the infrastructure and deploy our code. In this session, you will learn how to build a modern CI/CD pipeline in the cloud as well as hear what every system admin should know about transitioning to a DevOps model of operations.
For years, SQL Server Reporting Services and Power BI lived in their own separate worlds: SSRS as an on-premises solution and Power BI in the cloud. However, with the release of Power BI Report Server, SSRS and Power BI can live happily together as an on-premises solution. In this presentation, we'll cover the basics of Power BI Report Server. We'll discuss the essential moving parts and will walk through what your organization will need to get started using this new union of Power BI and SSRS.
In this session, we will build an end-to-end Visual Studio Team Services extension and share it privately with some tenants. We will discuss advanced scenarios requiring custom service endpoints, as well as how to handle extension updates.
There are many ways to detect and capture changes to the data in your business system to populate your data warehouse. In this session, we will compare and contrast several methods for loading slowly changing dimensions in your ETL solutions, including SSIS design patterns, T-SQL code, change data capture and temporal tables. Attendees will gain a full understanding of the pros and cons of each of these solutions and become confident in choosing and implementing them in their own ETL solutions.
Despite all the hype surround the Internet of Things, IoT security has been found lacking. Many are learning of IoT deployments with only months (or weeks!) notice, and IT managers are being thrown into the deep end of IoT security. In this presentation, you’ll get to experience real-world IoT threat modeling, which organizations are using to get a handle on this brave new world of embedded devices and new protocols.
The Query Store now allows us to track query plans as they change over time, giving us a slew of new possibilities when it comes to tuning our queries. Even just the ability to compare a previous plan to a new plan is a huge step toward understanding what may be happening in our instance. We can even tell the optimizer which plan we want it to use. These were all either extremely difficult—and, in some cases, impossible—to do before. This session will explain what the Query Store is all about and give you the insight to get started using this new and wonderful feature set.
Leading companies such as Google, Heroku and PagerDuty have developed successful incident management practices based on the public safety world's Incident Command System (ICS). This session offers key lessons learned by those organizations, along with a few war stories.
Remember that first time you saw Service Broker and thought of all the great things you could do with it? But when you actually tried Service Broker, you discovered all its limitations and pain points? Enter Apache Kafka. Apache Kafka is a distributed publish-subscribe messaging system that can scale out to handle millions of messages per second and support a distributed, microservices-oriented architecture. In this talk, we will cover the basics of this powerful system, including general architectural and design principles. We will also build a .NET project that uses Kafka to produce and consume messages quickly and efficiently.
In this session, we will demonstrate how to configure and manage firmware and driver settings, OS updates and patches, and applications and policies from the cloud using unified endpoint management technologies. And we will explain how to report on firmware and system information and create reports and dashboards. Learn how you can know when things are going to fail before the end user even notices it and create automated responses that will amaze your user base and eliminate your manual work. We’ll also teach you how to use Workspace ONE Unified Endpoint Management with Dell Technologies integration to manage the device's firmware and drivers.
Office 365, Exchange Online, SharePoint Online—everything starts with users and how to get them into Office 365. This in-depth session will help you ensure that users who work on-premises have the same flexibility when their service moves to Office 365. Office 365 offers a whole range of identity management options that allow you to use Office 365 as you wish. In this session, you will learn everything there is to know about user accounts, provisioning and single sign-on, and you will experience how Windows Azure AD can become your next best friend. Furthermore, you will learn how to use Azure Active Directory with the existing applications you have in your service catalog.
In this session, we'll walk you through how to protect against anomalies and safeguard your environment from predation with cloud app security. We will also show you how to mitigate risk from exposure, as well as how to control documentation and assets from being shared outside your organization.
"Modern Management" is easily used but historically has been difficult to realize for various reasons - both technical and process. Co-Management, introduced in 1710, helps remove many of these roadblocks and understanding co-management will be the focus of this session. We will focus discussion on why Co-Management is important, how it is configured and how it can be part of your modern management strategy.
Have you been frustrated by poor EC2 performance? Are you wondering if you're really getting the best bang for your buck from your AWS resources? Are you interested in how to properly gauge performance? Have you heard of kernel tuning but would like to know more? Then check out this session, where these topics—and more—will be covered.
Many .NET developers started their career happily using TFS as source control. Now, most projects use Git. Is this shift leaving you confused? In this session, you’ll gain a better understanding of Git, taught from the perspective of a .NET/Visual Studio developer. You’ll also learn how to use GitHub as a way to apply your newly acquired Git knowledge. You’ll walk away from this session knowing that you can now confidently join all Git-related discussions at work.
Code coverage with quality unit tests are your first line of defense to reducing technical debt, increasing code quality, and accelerating your ability to change and adapt code (without breaking it) while continuing to add new features. Most test-driven development (TDD) sessions focus on the easy-to-test areas of your code base that are almost never what you experience getting back to your desk. Come learn why TDD is not a fancy practice for the coding elite, but an understandable, obtainable and practical approach to delivering value for every developer, and how, when done properly, it will increase communication and design between the business stake holders and developers. This session is led by the author of Automated Unit Tests chapter in the Wrox book “Real World .NET, C#, and Silverlight: Indispensable Experiences from 15 MVPs.”
Tuning disk subsystems for optimal SQL Server performance is typically the domain of very experienced enterprise DBAs. It normally requires years of experience with the hard disk subsystem to learn exactly what configurations perform best, provide the greatest fault tolerance and allow for the most scalability. Configuring hardware can be very intimidating, especially when the application needs to scale. This session will teach you the best practices, tips and techniques to help you avoid costly mistakes, and they will serve as the foundation for the long-term success of your SQL Server environment.
When Microsoft announced Stretch Databases, we all loved the idea—that is, until pricing was revealed. But perhaps, by combining various SQL Server features, we could “stretch” databases to the cloud ourselves. By using files and filegroups and partitioning along with a locally mounted Azure or AWS fileshare, you can build your own stretch database without necessarily breaking the bank. In this session, you’ll learn the steps to build a quasi-stretch database to store stale data in cheap cloud storage yet still have it easily accessible when needed. t-->
What is serverless? What’s the difference between containainers and Lambda • Talking through how to deploy a serverless end implementation using the AWS toolset, taking advantage of Lambda, S3, Cognito, API Gateway and Cloudformation • How to use AWS’s infrastructure as code (IaC) tools, Cloudformation and SAM to make deployments even easier • Things to think about before going serverless - limits, bottlenecks.
This session will cover the background of the methods used in machine learning and artificial intelligence in a chronological order.
You have just been informed that you are moving to AWS. Now what? In this presentation, we’ll cover the ups and downs of using AWS Elastic Cloud Computing (EC2) instances for your SQL Server. We will show you how to make an EC2 instance and install SQL Server on it; go over networking, security and routing services; and demonstrate how to make a simple, highly available, two-node availability group. By the end of the session, you should be on the right track to start using AWS in your environment.