Technet Spotlight On Demand Video – Jeff Woolsey, Mike Sterling – Windows Server 2008 Hyper-V Architecture, Scenarios, and Networking

This session provides a high-level overview of the architecture of Hyper-V and VMM. The session then introduces the audience to an all up view of the different scenarios enabled by server virtualization and virtualization management. Product demonstrations within this presentation highlight the features of Hyper-V and Microsoft System Center Virtual Machine Manager 2008 in the…

0

Technet Spotlight On Demand Video – Alexander Lash, John Kelbley – Windows Server 2008 Hyper-V: Scripting and Programmatic Management for Fun and Profit (VBS and PowerShell)

Learn how to manage and manipulate Hyper-V, the next-generation virtualization platform from Microsoft using the WMI-based APIs through Windows PowerShell, Microsoft Visual Basic Script (VBS), and other automation tools. Live demonstrations and code samples for common and uncommon virtualization scenarios are shown and discussed. http://www.microsoft.com/emea/spotlight/sessionh.aspx?videoid=998

1

Technet Spotlight On Demand Video – Edwin Yuen – Microsoft System Center Virtual Machine Manager 2008: Overview

Get a sneak peek at System Center Virtual Machine Manager v.Next, the newest version of VMM. Learn about all the new features of VMM v.Next, including support for Hyper-V and VMware ESX management. This is a must see session for Hyper-V and VMware users to see the latest Microsoft System Center virtualization management tool.  http://www.microsoft.com/emea/spotlight/sessionh.aspx?videoid=997

0

Technet Spotlight On Demand Video – Ben Pearce – Windows, PowerShell, and Windows Management Instrumentation: Unveiling Microsoft’s Best Kept Secret

 Without doubt the most underused and underrated technology out there today is Windows Management Instrumentation (WMI). Since Windows 2000, Microsoft has included scriptable remote administration in all operating systems. For years people didn’t understand WMI, but then Windows PowerShell was born, WMI became accessible, and then WMI became the best kept secret at Microsoft. This…

1

Technet Spotlight On Demand Video – Mark Minasi – Windows Logins Revealed

Every day we log into our Windows systems. But what really happens when we do? How DO our workstations and our domain controllers exchange logon information without revealing our passwords? Security hardening guides talk about how scary old-style LM, NTLM and NTLMv2 logons are, but why EXACTLY do they say that-particularly when it’s practically impossible…

1

Technet Spotlight On Demand Video – Corey Hynes – How to Build Your Next Generation IT Infrastructure Using Windows Server 2008

What does “your” network of the future hold? How far away is it? Find out in this demo session on Windows Server 2008. This session, which is intended for people who plan, deploy, and manage IT infrastructure, will show you how all the different part of Windows Server 2008 come together to give you a…

0

Technet Spotlight On Demand Video – Brad Wright – Introduction to Microsoft Forefront Code Name "Stirling"

Forefront code name “Stirling” is a single product that delivers comprehensive, coordinated protection with unified security management and reporting across clients, server applications, and the network edge. In this session, learn what Stirling is all about-from the infrastructure, to the protection, to the reporting-and how we’re integrating with the System Center platform to provide increased…

0

Technet Spotlight On Demand Video – Steve Riley – Virtualization and Security: What Does It Mean for Me?

Virtualization is the Next Big Thing, and certainly you’ve at least examined it, and probably are using several virtualized servers already. How are you handling the security of your images? How are you securing the guest and host operating systems, and the applications you’re running? Virtualization raises certain unique security requirements, and provides some interesting…

1

Technet Spotlight On Demand Video – Alex Smolen, Rudolph Araujo – The Spy Who Hacked Me!

This is a joint presentation with Rudolph Araujo, a fellow Developer Security MVP, which will draw on his malware and Visual C/C++ skills and Alex’s Web security skills. Consider the following scenario: you work as a developer/IT professional at a company facing increasing competition from a low cost provider in Slobovia. Your company’s competitive advantages…

0