Taste of Premier   (MP4) - Channel 9 show

Taste of Premier (MP4) - Channel 9

Summary: Microsoft Services Premier Support gives you direct access to the world's top Microsoft technical experts, pairing you with a dedicated support team providing 24/7 hands-on assistance. "Taste of Premier" is dedicated to helping you maximize your company's IT infrastructure and development investment by showcasing the latest Microsoft products and services and demonstrating how these technologies can positively impact your bottom line. Click here to learn more about Microsoft Service Premier Support

Podcasts:

 Holiday deals from the Microsoft Store - Harmon Kardon Invoke, Xbox One X and much more! | File Type: video/mp4 | Duration: 1401

It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more! [01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy | File Type: video/mp4 | Duration: 2029

Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today. Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets. [02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?Learn More about this topic by visiting these sites: Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference StrategiesLearn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure you

 Your Private Network in the cloud: (Part 4) How to make your connections fast, reliable and private using Azure ExpressRoute | File Type: video/mp4 | Duration: 1507

Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections. Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations. [02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

 How to manage Office 365 with System Center Configuration Manager | File Type: video/mp4 | Duration: 1245

System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and Office 365 Business. Join Lex Thomas and Jamin Almond for this all demo session on how to deploy, manage and update Office 365 with System Center Configuration Manager. [02:11] DEMO – Managing Office 365 with System Center Configuration Manager[06:50] DEMO – How to deploy Office 365 with SCCM[15:21] DEMO – How to create and manage automatic updates for Office 365 with SCCM [19:40] Is there a specific version of SCCM needed to do everything you demoed for us today?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportManage Office 365 ProPlus with System Center Configuration Manager

 The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks | File Type: video/mp4 | Duration: 2939

Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats. Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data. [06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks [34:46] How can Microsoft help against email attacks?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure | File Type: video/mp4 | Duration: 3780

With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter. Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines. [00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

 Your Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network | File Type: video/mp4 | Duration: 3050

The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network. Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure. [00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-Up | File Type: video/mp4 | Duration: 1454

The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network. Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series. [04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 From Expert Service to Free Training Programs and Events...Find out what's next at the Microsoft Store | File Type: video/mp4 | Duration: 1363

From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone. Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store. [03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Connecting Customers with Microsoft Product Teams | File Type: video/mp4 | Duration: 884

The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization. [00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services | File Type: video/mp4 | Duration: 1972

Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also validates digital certificates by verifying the authenticity of the certificate, the validity of the certificate, and that the certificate is trustworthy. Join Lex Thomas as he welcomes Wes Hammond to the show as they give us an in-depth overview of PKI and Active Directory Certificate Services (ADCS) as well as what Microsoft Premier offerings are available. [1:40] Why are digital certificates (PKI, Active Directory Certificates, etc.) important?[5:02] What can you tell us about PKI and the role it plays?[13:35] What is SHA-1 Deprecation?[20:50] What are some Premier offerings around ADCS?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

 Predictions for 2017 and Beyond: A look into what's driving the future of technology with Microsoft CTO of Services, Norm Judah | File Type: video/mp4 | Duration: 1995

Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review some of the major trends and challenges that will shape what new innovative tech is coming our way. [1:25] Two years ago we were joking about connected socks and park benches. Is that a reality now?[3:10] Where have we seen innovations in IoT devices make an impact?[6:13] What should children be learning now, so that they can be prepared for the workforce in 20-30 years?[7:58] Now that we have all of this data, what can we do with it? How does Artificial Intelligence (A.I.) fit into the equation?[9:20] When do the questions about privacy and ethics come into play?[13:32] What impact do you see augmented reality playing in our future?[27:45] Will this VR,AR, or mixed reality technology replace going to theme parks physically?[29:51] What do you think we can see coming in the next year or so?Learn more about Microsoft Premier Support Services. Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRanso

 (Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience | File Type: video/mp4 | Duration: 1699

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity. Join us for Part 3 in this series as Lex Thomas and Razi Rais show us Azure Container Services as well as how to setup monitoring and analytics. [0:30] What is Azure Container Service?[3:20] Does Orchestration = Containers?[5:40] DEMO: Monitoring and Analytics Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential

 (Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience | File Type: video/mp4 | Duration: 2653

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity. Join Lex Thomas and Razi Rais as they show us how to deploy a continuous integration and continuous deployment solution using Microsoft Azure Container Service. [2:54] The Big Picture – Making DevOps successful[6:34] DEMO: Building a Continuous Integration and Continuous Deployment system with Azure Container Service and Visual Studio Team SystemMulti-Container Application | ASP.NET CoreContainer Images Storage | Azure Private Docker RegistryBuild & Release Deployment | Visual Studio Team SystemLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security Progr

 (Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience | File Type: video/mp4 | Duration: 4130

Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity. Join Lex Thomas and Razi Rais as they take us through an in-depth overview and demo rich session on DevOps with Containers. [2:01] What is a Container and how can it benefit organizations?[5:20] DEMO: Windows Containers 101- Basics and Overview [9:33] DEMO: How to create a Container on Nano Server[15:39] DEMO: Windows Server Core and Containers[19:36] DEMO: How to containerize legacy ASP.NET 4.5 application[43:48] DEMO: Running a container in Microsoft SQL Server ExpressLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detec

Comments

Login or signup comment.