Get hybrid-ready at a free IT Camp in your local area! Join us for this interactive, full-day training session and learn how to move your workloads from on-premises to the cloud and back again. You’ll see how Microsoft Azure supports powerful virtualization, on-demand application scaling, complete data control, and the fastest customer response times around. |
||||||||||||||||||||
|
||||||||||||||||||||
Don’t miss this valuable, free event in your local area – regardless of whether you’re new to the cloud, or you currently use an on-premises, hybrid or fully cloud-based solution. All IT Pros are welcome! Register: http://aka.ms/hybridclouditcamp
Technorati Tags: Free Training from Microsoft on Azure
|
Free E-book Microsoft Azure Essentials: Azure Machine Learning
Azure Machine Learning is a service that a developer can use to build predictive analytics models (using training datasets from a variety of data sources) and then easily deploy those models for consumption as cloud web services.
Microsoft Azure Machine Learning (ML) is a service that a developer can use to build predictive analytics models (using training datasets from a variety of data sources) and then easily deploy those models for consumption as cloud web services. Azure ML Studio provides rich functionality to support many end-to-end workflow scenarios for constructing predictive models, from easy access to common data sources, rich data exploration and visualization tools, application of popular ML algorithms, and powerful model evaluation, experimentation, and web publication tooling.
This ebook will present an overview of modern data science theory and principles, the associated workflow, and then cover some of the more common machine learning algorithms in use today. We will build a variety of predictive analytics models using real world data, evaluate several different machine learning algorithms and modeling strategies, and then deploy the finished models as machine learning web service on Azure within a matter of minutes. The book will also expand on a working Azure Machine Learning predictive model example to explore the types of client and server applications you can create to consume Azure Machine Learning web services.
The scenarios and end-to-end examples in this book are intended to provide sufficient information for you to quickly begin leveraging the capabilities of Azure ML Studio and then easily extend the sample scenarios to create your own powerful predictive analytic experiments. The book wraps up by providing details on how to apply “continuous learning” techniques to programmatically “retrain” Azure ML predictive models without any human intervention.
You can get the e-book here
Critical HTTPS bug may open 25,000 iOS apps to eavesdropping attacks
Arming Yourself Against Identity Theft
Many years ago I wrote a article when I was working for Global Knowledge, I was looking at it, and it was interesting that what I wrote many years ago still holds true today …
You can read the article HERE
Free E-Book—Microsoft System Center: Deploying Hyper-V with Storage & Networking Focus on the what
Another free book
Focus on the what, why, and how when it comes to deploying the foundation of a software-defined datacenter based on Windows Server 2012 R2 and System Center 2012 R2. Learn the steps to implement configuration on your own hardware while discovering details on design considerations and best practices.
Download the e-book here.
ISACA Philadelphia 2015 Spring Training Week
Security conference that you might want to attend
Come join us at the Tropicana Casino and Resort in Atlantic City, NJ this Spring for the latest techniques and approaches on current topics in security and IT auditing.
Sessions include:
- A Security Track featuring: Securing Active Directory, Wireless Security, CSX CyberSecurity Fundamentals, and Threat Modeling
- A Risk / Audit Track featuring Vendor Risk Management, Managing Audits as Projects, Soft Skills for Auditors, and Assessing Data Reliability
PLUS- A Hands On Track of courses in Mobile Device Security and CyberSecurity Investigations
I will be speaking at this event, doing sessions on
Getting Your Hands Dirty With Active Directory
Wireless Security
The conference runs
Monday, April 20, 2015 – Friday, April 24, 2015
7:30 AM – 5:00 PM
to find out more go here
Remote Server Administration Tools for Windows 10 Technical Preview now out
This version works with Build 10041 .
Remote Server Administration Tools (RSAT) for Windows 10 Technical Preview enables IT administrators to manage roles and features that are installed on computers that are running Windows Server Technical Preview from a remote computer that is running Windows 10 Technical Preview
You can get the install here
Another Free Book Microsoft Microsoft System Center Software Update Management Field Experience
This ebook addresses some of the gaps and pain points you might encounter when implementing, administering, and troubleshooting Software Updates using Configuration Manager 2012 R2. The advice is based on the authors’ experiences working as Premier Field Engineers and Microsoft Consultants in customer environments on a daily basis. Enjoy this book and the shared experiences from the field.
You can download the Book Here
and Download Companion Files Here
Trustworthy Computing | February 2015 Microsoft Security Newsletter
In the Trustworthy Computing | February 2015 there is a article I wrote about “Simplify secure infrastructure management with System Center” This article can be found here
This is the starting point for some future post that I will be adding to my blog around the use of automation to help secure IT infrastructure. Using tools from different suppliers, to maintain baselines and reduce risk by automating processes
The focus of these articles will be on the SMB to Midsize companies. who need a simple way to reduce work loads while protecting company data and systems.
This article can be found here
How vulnerable Is Windows compared to others operating system
Most people think that Windows, which is often referred to as the most vulnerable operating system in the world and also an easy pie for hackers, is not even listed on the top three vulnerable OS. According to an analysis by the network and security solutions provider GFI, the top three most vulnerable operating system are:
· Apple’s Mac OS X
· Apple iOS
· Linux kernel
see the details here