Videos

Microsoft cybersecurity reference architecture: A-Z explained with live demos | BRK2272
1/14/2020, YouTube: Microsoft Ignite [0:38:55]
The Microsoft cybersecurity reference architecture will be explained by demoing key components, starting with Azure Security Center for a cross platform visibility, protection and threat...
Microsoft cybersecurity reference architecture: A-Z explained with live demos | BRK2272R
1/14/2020, YouTube: Microsoft Ignite [0:44:21]
The Microsoft cybersecurity reference architecture will be explained by demoing key components, starting with Azure Security Center for a cross platform visibility, protection and threat...
Modernizing your application with containers | APPS30
1/14/2020, YouTube: Microsoft Ignite [0:45:07]
Tailwind Traders recently moved one of its core applications from a virtual machine into containers, gaining deployment flexibility and repeatable builds. In this session, learn how to manage...
Code-free ETL using Azure Data Factory | BRK3045
1/14/2020, YouTube: Microsoft Ignite [0:41:31]
Customers face common data integration problems every day. This session showcases how to use Azure SQL Data Warehouse, Azure Data Factory, Azure Data Lake Store, Azure Databricks, Azure Key Vault...
Modernizing your application with containers
11/5/2019, Ignite 2019 [0:45:00]
Tailwind Traders recently moved one of its core applications from a virtual machine into containers, gaining deployment flexibility and repeatable builds. In this session, learn how to manage...
Microsoft cybersecurity reference architecture: A-Z explained with live demos (REPEAT)
11/5/2019, Ignite 2019 [0:45:00]
The Microsoft cybersecurity reference architecture will be explained by demoing key components, starting with Azure Security Center for a cross platform visibility, protection and threat...
Microsoft cybersecurity reference architecture: A-Z explained with live demos
11/5/2019, Ignite 2019 [0:45:00]
The Microsoft cybersecurity reference architecture will be explained by demoing key components, starting with Azure Security Center for a cross platform visibility, protection and threat...
Code-free ETL using Azure Data Factory
11/5/2019, Ignite 2019 [0:45:00]
Customers face common data integration problems every day. This session showcases how to use Azure SQL Data Warehouse, Azure Data Factory, Azure Data Lake Store, Azure Databricks, Azure Key Vault...
Write Blockchain-Powered Azure Functions in Python leveraging Azure Key Vault
10/21/2019, YouTube: Microsoft Developer [0:04:43]
In this session we show how to write Azure Functions using Python and leveraging Azure Key Vault for key storage. For additional information, please visit:...
Write Blockchain-Powered Azure Functions in Java leveraging Azure Key Vault
10/14/2019, YouTube: Microsoft Developer [0:05:01]
In this session we show how to write Azure Functions using Java and leveraging Azure Key Vault for key storage. For additional information, please visit:...
Cloud Native Configuration and Setting in ASP.NET Core
10/9/2019, YouTube: Microsoft Developer [0:16:07]
One of the "Factors" in cloud native applications states you should store your configuration and settings outside of your core application code. In this episode, Shayne talks with Andrew to get a...
Azure Security: Can you keep a secret? - BRK3063
5/9/2019, YouTube: Microsoft Developer [0:50:53]
Millions of user accounts were stolen from a big ride-sharing company recently -- all because a developer leaked an important credential on GitHub! Even the best of us makes mistakes sometimes....