Microsoft Azure
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Iot Continuum: Evolving Business Iot in Action, Taipei, November 20Th —Event Agenda
IoT Continuum: Evolving Business IoT in Action, Taipei, November 20th —Event Agenda Executive Keynote 9:30–10:15am Business Transformation In Action 10:15–11:00am Architecting the Intelligent Edge to Create Scalable Repeatable Solutions 11:00–12:00pm Lunch Networking Break 12:00–1:00pm Unlocking IoT’s Potential 1:00–1:45pm Developing an IoT Security Practice for Durable Innovation 1:45–2:15pm Partner Case Study: Innodisk Corporation 2:15-2:45pm Afternoon Networking Break 2:45-3:30pm Evolving IoT with Mixed Reality, AI, Drone and Robotic Technology 3:30–4:00pm Partner Case Study: AAEON Technology, Inc. 4:00-4:30pm Activating Microsoft Resources & Programs to Accelerate Time to Market and Co-sell 4:30–5:00pm Partner-Customer Networking & Sponsored Partner Solution Showcase All day Our Goal IoT Community Partners Technology 50B 175ZB total amount of data connected devices by 2025 by 2030 500M+ business apps by 2023 “Building applications for multi-device, multi-sense experiences is going to require a very different form of computing architecture. That's the motivation for bringing together all of our systems and people. Silicon in the edge to the silicon in the cloud architected as one workload that is distributed— that’s the challenge in front of us.” Intelligent Cloud —Satya Nadella, Q&A Session, April 2018 Intelligent Edge Innovations enabling new opportunities Digital Twins AI Edge Cloud IoT Globally available, unlimited Harnessing signals from Intelligence offloaded from the Breakthrough intelligence Create living replicas of any compute -
1 Table of Contents List of Figures
Table of Contents List of Figures ..................................................................................................................... 4 List of Tables ...................................................................................................................... 5 Chapter 1: Introduction....................................................................................................... 6 1.1 Introduction....................................................................................................................6 1.2 Problem Statement .......................................................................................................12 1.3 Thesis Objective...........................................................................................................12 1.4 Thesis Organization.....................................................................................................14 Chapter 2: Intrusion Detection.......................................................................................... 15 2.1 Introduction..................................................................................................................15 2.2 What is an IDS .............................................................................................................15 2.2.1 The Basic Concepts of Intrusion Detection......................................................16 2.2.2 A Generic Intrusion-Detection System.............................................................17 2.2.3 Characteristics of -
Paid Search and Microsoft Audience Ads BETTER TOGETHER
Paid search and Microsoft Audience Ads BETTER TOGETHER Hand in hand, they deliver more eyeballs and clicks Whether it’s cookies with milk or cake and ice cream, some things are simply better together. The same rings true for combining search advertising’s finest with the best of native advertising. When used together, they can help marketers reach customers across multiple touch points of the user journey, and get high-quality clicks and conversions at scale. While native ads is a well-recognized ad format, we call them Microsoft Audience Ads. After all, it’s more about reaching the right audience and less about the ad type, right? Ad spend is growing for native and search In fact, it’s growing by double digits for both. 25% 11% Expected annual growth in Expected annual growth in native ad spending in the paid search ad spending U.S. through 20191 in the U.S. through 20202 2018 2019 2018 2019 2020 Looking to increase impressions and capture more purchase intent? Using native and paid search ads together can help you get results at scale. MORE HIGHER HIGHER HIGHER FREQUENTLY PURCHASE BRAND PURCHASE 53% VIEWED 32% INTENT 24% RECALL 18% INTENT DISPLAY VS. NATIVE NO BRAND AD VS. BRAND AD NO BRAND AD VS. BRAND AD BANNER VS. NATIVE Consumers viewed Searchers on Bing Searchers on Bing who Native ads registered native ads 53% more who saw a brand’s ad saw a brand’s ad were an 18% higher lift in frequently than they showed 32% higher 24% more likely to purchase intent than viewed display ads.3 purchase intent even recall the brand than banner ads.3 if they didn’t click on a those who didn’t see brand’s ad.4 the ad.4 Two powerful ways to run Microsoft Audience Ads Along with your search campaigns, add Microsoft Audience Ads to get more high-quality volume outside of search. -
Blackbaud CRM Security Guide
Security Guide 11/10/2014 Blackbaud Direct Marketing 4.0 Security UK ©2014 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying, recording, storage in an information retrieval system, or oth- erwise, without the prior written permission of Blackbaud, Inc. The information in this manual has been carefully checked and is believed to be accurate. Blackbaud, Inc., assumes no responsibility for any inaccuracies, errors, or omissions in this manual. In no event will Blackbaud, Inc., be liable for direct, indirect, special, incidental, or consequential damages resulting from any defect or omission in this manual, even if advised of the possibility of damages. In the interest of continuing product development, Blackbaud, Inc., reserves the right to make improvements in this manual and the products it describes at any time, without notice or obligation. All Blackbaud product names appearing herein are trademarks or registered trademarks of Blackbaud, Inc. All other products and company names mentioned herein are trademarks of their respective holder. Security-2014 Contents CONTENTS I SECURITY 1 Fundamentals of Security 1 APPLICATION USERS 3 Search for Users 3 Application User Records 4 Add an Application User 4 Edit Users 5 Delete Users 6 Grant/Revoke Users Administrator Rights 6 Run the Program as a Selected User 6 Organisational Unit Record 7 Application Users Page 8 Manage System Roles of an Application User 8 Add System Roles -
Migrating from Storsimple to Azure Netapp Files and Global File Cache
REFERENCE ARCHITECTURE Globally Distributed Enterprise File Sharing with Azure NetApp Files and NetApp Global File Cache Evolving from StorSimple to next-gen Azure solutions. Table of contents Introduction 3 Solution overview 3 A New Data Store with Azure NetApp Files 4 Azure NetApp Files features 4 Using Azure NetApp Files to consolidate distributed file servers 5 Accessing the ANF datastore with a Global File Cache fabric 5 NetApp Global File Cache Edge 6 NetApp Global File Cache Edge instance 6 Network connectivity 6 Configuration guidelines 6 Azure NetApp Files with Global File Cache topology 6 Deployment methodologies 7 Operating environment summary 7 User experience 7 Migrate your StorSimple data to Azure NetApp Files 8 Overview of data migration – StorSimple to Azure NetApp Files 8 Getting the data to Azure 8 Volume Clone 8 Create Azure VM 8 Connecting to the Cloud Appliance 8 Create Azure NetApp Files share 9 Data copy 9 Summary 9 2 Document title Streamline and simplify IT storage Solution overview and infrastructure by centralizing NetApp Global File Cache + Azure NetApp Files: unstructured data into Microsoft Azure a “major step” in unstructured data management for the distributed enterprise using Azure NetApp Files to provide 85% of companies are in the process of adopting a fast local and geographically distributed cloud transformation strategy. This means combining access with NetApp Global File Cache™. on-premises, hybrid, and public cloud services and associated storage technologies, like file/block-based and object storage (e.g., Azure BLOB) to host both Introduction structured and unstructured data. Why did people use StorSimple...what are the NetApp and Microsoft recognize the impact on primary use-cases? the organization, end users, distributed IT strategy, • Unstructured file shares that can be more easily datacenter, and cloud operations. -
The Developer's 5-Step Guide to Power BI Embedded
The Developer’s 5-Step Guide to Power BI Embedded 5 Step Guide to Using Power BI Embedded 2 Your guide to using Power BI Embedded will briefly cover a few prerequisites, and will then look at five steps to complete: Start building fully 1. Set up your development environment interactive reports and dashboards into 2. Set up your Power BI environment your application, 3. Create and publish content website, or portal. 4. Embed your content for testing 5. Move to production If you’re not ready to start today, get familiar with Power BI Embedded in the Power BI Embedded Playground. Try out all the front-end features you can offer customers with pre-configured visuals and data models. 5 Step Guide to Using Power BI Embedded 3 What is Power BI Embedded? Power BI Embedded allows you to white label Microsoft Power BI to quickly and easily provide engaging front-end analytics and dashboards to your customers. Save time and expense by embedding fully Give your customers high-fidelity, Choose from a broad range of data interactive reports and dashboards into interactive analytics across any device. visualizations or build your own applications, websites, and portals. custom illustrations. Power BI Embedded also includes an extensive library of data connectors, APIs, and fully-documented SDKs. Choose the right set of options for your application and customers, whether you need basic data visualizations or complex interactive analytics. The Prerequisites: Complete these prerequisites to get started: • Open an Azure subscription. Create a free account. • Set up your own Azure Active Directory tenant. -
Azure Web Apps for Developers Microsoft Azure Essentials
Azure Web Apps for Developers Microsoft Azure Essentials Rick Rainey Visit us today at microsoftpressstore.com • Hundreds of titles available – Books, eBooks, and online resources from industry experts • Free U.S. shipping • eBooks in multiple formats – Read on your computer, tablet, mobile device, or e-reader • Print & eBook Best Value Packs • eBook Deal of the Week – Save up to 60% on featured titles • Newsletter and special offers – Be the first to hear about new releases, specials, and more • Register your book – Get additional benefits Hear about it first. Get the latest news from Microsoft Press sent to your inbox. • New and upcoming books • Special offers • Free eBooks • How-to articles Sign up today at MicrosoftPressStore.com/Newsletters Wait, there’s more... Find more great content and resources in the Microsoft Press Guided Tours app. The Microsoft Press Guided Tours app provides insightful tours by Microsoft Press authors of new and evolving Microsoft technologies. • Share text, code, illustrations, videos, and links with peers and friends • Create and manage highlights and notes • View resources and download code samples • Tag resources as favorites or to read later • Watch explanatory videos • Copy complete code listings and scripts Download from Windows Store PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2015 Microsoft Corporation. All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-1-5093-0059-4 Microsoft Press books are available through booksellers and distributors worldwide. -
Microsoft Cloud Agreement
Microsoft Cloud Agreement This Microsoft Cloud Agreement is entered into between the entity you represent, or, if you do not designate an entity in connection with a Subscription purchase or renewal, you individually (“Customer”), and Microsoft Ireland Operations Limited (“Microsoft”). It consists of the terms and conditions below, Use Rights, SLA, and all documents referenced within those documents (together, the “agreement”). It is effective on the date that your Reseller provisions your Subscription. Key terms are defined in Section 10. 1. Grants, rights and terms. All rights granted under this agreement are non-exclusive and non-transferable and apply as long as neither Customer nor any of its Affiliates is in material breach of this agreement. a. Software. Upon acceptance of each order, Microsoft grants Customer a limited right to use the Software in the quantities ordered. (i) Use Rights. The Use Rights in effect when Customer orders Software will apply to Customer’s use of the version of the Software that is current at the time. For future versions and new Software, the Use Rights in effect when those versions and Software are first released will apply. Changes Microsoft makes to the Use Rights for a particular version will not apply unless Customer chooses to have those changes apply. (ii) Temporary and perpetual licenses. Licenses available on a subscription basis are temporary. For all other licenses, the right to use Software becomes perpetual upon payment in full. b. Online Services. Customer may use the Online Services as provided in this agreement. (i) Online Services Terms. The Online Services Terms in effect when Customer orders or renews a subscription to an Online Service will apply for the applicable subscription term. -
Lesson 14: Creating and Managing Active Directory Users and Computers
Lesson 14: Creating and Managing Active Directory Users and Computers MOAC 70-410: Installing and Configuring Windows Server 2012 Overview • Exam Objective 5.2: Create and Manage Active Directory Users and Computers • Creating User Objects • Creating Computer Objects • Managing Active Directory Objects © 2013 John Wiley & Sons, Inc. 2 Creating User Objects Lesson 14: Creating and Managing Active Directory Users and Computers © 2013 John Wiley & Sons, Inc. 3 Creating User Objects • The user account is the primary method for authentication on a network. • Usernames and passwords are validated at log on by comparing entered information to the information stored in the AD DS database. © 2013 John Wiley & Sons, Inc. 4 Types of Users • Local users: These accounts can only access resources on the local computer and are stored in the local Security Account Manager (SAM) database on the computer where they reside. • Domain users: These accounts can access AD DS or network-based resources, such as shared folders and printers. o Account information for these users is stored in the AD DS database and replicated to all domain controllers within the same domain. © 2013 John Wiley & Sons, Inc. 5 Built-In User Accounts Administrator and Guest • On a member server or standalone server: The built-in local Administrator account has full control of all files as well as complete management permissions for the local computer. • On a domain controller: The built-in Administrator account created in Active Directory has full control of the domain in which it was created. The Administrator account cannot be deleted, but it can be renamed. © 2013 John Wiley & Sons, Inc. -
Power BI Pitch Deck FY20
Power BI overview Speaker name Title Modern analytics Speaker name Title Companies want to do more with data 70% of organizations believe their data is not used to its fullest extent But it’s hard to do Amount of data Data sources Lack of is growing are growing specialized workers 163ZB 86% #1 worldwide data challenged to analyze data science and creation by 2025 unstructured data analytics are most –IDC: Data Age 2025 –IDG: Big Data Survey challenging to find –IDG: State of CIO How does Power BI help modernize analytics? Unify self-service AI gets to Anyone can and enterprise BI insights faster access and analyze Remove the challenges of multiple Reduce the amount of Make sense of data and drive solutions and conquer data both time spent wrangling data and confident decisions without structured and unstructured spend more time getting answers relying on specialized skills Data culture Unify self-service and enterprise BI • Reduce cost, complexity, and challenges of multiple analytics systems • Grow and evolve with a scalable, secure, and compliant platform • Enterprise BI tools like SSRS and SSAS are inside Power BI • Protect your data inside and outside of Power BI Pair Power BI with Microsoft Information Protection and Microsoft Cloud App Security to better protect Power BI data Apply sensitivity labels Extend protection and Better meet privacy and Help prevent exposure of familiar in Office 365 governance policies to regulatory requirements sensitive data by apps like Word, Excel, Power BI data— with oversight of blocking risky user PowerPoint, and Outlook including exported sensitive data through activities, in real time, to Power BI data. -
Package 'Azurecosmosr'
Package ‘AzureCosmosR’ January 19, 2021 Title Interface to the 'Azure Cosmos DB' 'NoSQL' Database Service Version 1.0.0 Description An interface to 'Azure CosmosDB': <https://azure.microsoft.com/en-us/services/cosmos- db/>. On the admin side, 'AzureCosmosR' provides functionality to create and manage 'Cos- mos DB' instances in Microsoft's 'Azure' cloud. On the client side, it provides an inter- face to the 'Cosmos DB' SQL API, letting the user store and query documents and attach- ments in 'Cosmos DB'. Part of the 'AzureR' family of packages. URL https://github.com/Azure/AzureCosmosR https://github.com/Azure/AzureR BugReports https://github.com/Azure/AzureCosmosR/issues License MIT + file LICENSE VignetteBuilder knitr Depends R (>= 3.3) Imports utils, AzureRMR (>= 2.3.3), curl, openssl, jsonlite, httr, uuid, vctrs (>= 0.3.0) Suggests AzureTableStor, mongolite, DBI, odbc, dplyr, testthat, knitr, rmarkdown RoxygenNote 7.1.1 NeedsCompilation no Author Hong Ooi [aut, cre], Andrew Liu [ctb] (Assistance with Cosmos DB), Microsoft [cph] Maintainer Hong Ooi <[email protected]> Repository CRAN Date/Publication 2021-01-18 23:50:05 UTC R topics documented: az_cosmosdb . .2 bulk_delete . .3 1 2 az_cosmosdb bulk_import . .5 cosmos_endpoint . .6 cosmos_mongo_endpoint . .9 create_cosmosdb_account . 11 delete_cosmosdb_account . 12 do_cosmos_op . 13 get_cosmosdb_account . 14 get_cosmos_container . 15 get_cosmos_database . 17 get_document . 19 get_partition_key . 21 get_stored_procedure . 22 get_udf . 24 query_documents . 26 Index 29 az_cosmosdb Azure Cosmos DB account class Description Class representing an Azure Cosmos DB account. For working with the data inside the account, see cosmos_endpoint and cosmos_database. Methods The following methods are available, in addition to those provided by the AzureRMR::az_resource class: • list_keys(read_only=FALSE): Return the access keys for this account. -
How Github Secures Open Source Software
How GitHub secures open source software Learn how GitHub works to protect you as you use, contribute to, and build on open source. HOW GITHUB SECURES OPEN SOURCE SOFTWARE PAGE — 1 That’s why we’ve built tools and processes that allow GitHub’s role in securing organizations and open source maintainers to code securely throughout the entire software development open source software lifecycle. Taking security and shifting it to the left allows organizations and projects to prevent errors and failures Open source software is everywhere, before a security incident happens. powering the languages, frameworks, and GitHub works hard to secure our community and applications your team uses every day. the open source software you use, build on, and contribute to. Through features, services, and security A study conducted by the Synopsys Center for Open initiatives, we provide the millions of open source Source Research and Innovation found that enterprise projects on GitHub—and the businesses that rely on software is now comprised of more than 90 percent them—with best practices to learn and leverage across open source code—and businesses are taking notice. their workflows. The State of Enterprise Open Source study by Red Hat confirmed that “95 percent of respondents say open source is strategically important” for organizations. Making code widely available has changed how Making open source software is built, with more reuse of code and complex more secure dependencies—but not without introducing security and compliance concerns. Open source projects, like all software, can have vulnerabilities. They can even be GitHub Advisory Database, vulnerable the target of malicious actors who may try to use open dependency alerts, and Dependabot source code to introduce vulnerabilities downstream, attacking the software supply chain.