en pl Paula Januszkiewicz – MVP Security Tomasz Onyszko – Microsoft Michał Bojko Grzegorz Tworek – MVP Security Marcin Szeliga – MVP SQL Marek Adamczuk – MVP SQL Bartłomiej Graczyk - MCT Jessica Moss - MVP SQL BI Paweł Potasiński – MVP SQL Bartosz Pampuch - MVP Szymon Pobiega Szymon Kobalczyk - MVP Tomasz Wiśniewski Andy Malone - MVP Security Marcin Najder Łukasz Grala Maciej Pilecki - MVP SQL Sander Berkouwer - MVP Thomas Shinder - MVP Krzysztof Koźmic Freena Eijffinger Krzysztof Pietrzak - MCT Christopher Davis - MVP
  • Warsaw:
  • Seattle:
  • New York:


  • Partners
    GITCA Reklama
  • Organizator
    VirtualStudy.pl

Agenda


The agendas concerning the sessions will be put on the site successively. We are encouraging everybody who is interested to visit our site regularly and reading news.

Agenda:

Session: Speaker: SEATTLE TIME (UTC-7)
IT Pro Track - Polish: Robert Stuczyński
0. Introduction Robert Stuczyński 00:00AM - 00:15AM
see world time
1. DirectAccess - How it Works Krzysztof Pietrzak 00:15AM - 01:30AM
see world time
2. Blue screen of death for everybody! Grzegorz Tworek 01:45AM - 03:00AM
see world time
3. SharePoint 2010 - building a business solution Michał Bojko 03:15AM - 04:30AM
see world time
4. Windows Security Management -simple or this is only an illusion? Paula Januszkiewicz 05:10AM - 06:25AM
see world time
5. ADFS (v2) re-loaded: Keys to the kingdom Tomasz Onyszko 06:40AM - 07:55AM
see world time
SQL Track - Polish: Beata Zalewa
0. Introduction Robert Stuczyński 00:00AM - 00:15AM
see world time
1. Where SQL Trace can’t help, there use eXtended Events? Łukasz Grala 00:15AM - 01:30AM
see world time
2. Microsoft Clustering od A do Z Marcin Szeliga 01:45AM - 03:00AM
see world time
3. SQL Server Reporting Services - Tips & Tricks Bartek Graczyk 03:15AM - 04:30AM
see world time
4. Free applications for performance troubleshooting in SQL Server 2008 Paweł Potasiński 05:10AM - 06:25AM
see world time
5. The Key to success in the database Marek Adamczuk 06:40AM - 07:55AM
see world time
Dev Track - Polish: Bartek Pampuch
0. Introduction Robert Stuczyński 00:00AM - 00:15AM
see world time
1. IoC containers - everything what you must know to their topic Krzysztof Koźmic
Bartosz Pampuch
00:15AM - 01:30AM
see world time
2. OData - exchanging the data! Tomasz Wisniewski 01:45AM - 03:00AM
see world time
3. Windows at your fingertips - touch applications programming for Windows 7 Szymon Kobalczyk
Freena Eijffinger
03:15AM - 04:30AM
see world time
4. Reactive Programming - a new paradigm of programming Marcin Najder 05:10AM - 06:25AM
see world time
5. Remote Services Szymon Pobiega 06:40AM - 07:55AM
see world time
IT Pro Track - English: Michał Bojko
0. Introduction Michał Bojko 09:00AM-09:15AM
see world time
1. SharePoint 2010 - building a business solution Michał Bojko 09:15AM-10:30AM
see world time
2. Active Directory Best Practices in Hyper-V environments Sander Berkouwer 10:45AM-12:00AM
see world time
3. SQL Server User-Defined Functions - The Good, The Bad, The Ugly Maciej Pilecki 12:15AM-01:30PM
see world time
4. Make Reporting Services Work For You Jessica Moss 02:10PM-03:25PM
see world time
Security Track - English: Paula Januszkiewicz / Grzegorz Tworek
0. Introduction Paula Januszkiewicz
Grzegorz Tworek
09:00AM-09:15AM
see world time
1. Secure Endpoint: DirectAccess and Microsoft Forefront Unified Access Gateway 2010, the Complete Remote Access Solution Thomas Shinder 09:15AM-10:30AM
see world time
2. Catching one tail with three heads - Kerberos explained Tomek Onyszko 10:45AM-12:00AM
see world time
3. Cybercrime: The Gathering Storm! Andy Malone 12:15AM-01:30PM
see world time
4. Killing Botnets Chris Davis 01:45PM-03:00PM
see world time
5. Password secrets revealed! Everything you want to know but are afraid to ask (or had no time to check it) Paula Januszkiewicz 03:15PM-04:30PM
see world time

Descriptions:

IT Pro Track - Polish
1. DirectAccess - How it Works - Krzysztof Pietrzak
DirectAccess is currently at hype in VPN technologies. But what makes it work? Is it a new protocol, or just clever reusing of old ideas? This session will try to answer those question, going deeper into DA implementation, including IPv6, Transition Technologies, and IPSec.

2. Blue screen of death for everybody! - Grzegorz Tworek
Blue screens of death are the favorite topic of IT jokes. For some blue screens are ridiculous, for others - irritating. But in reality very few people can use them wisely and with premises - to solve the problem. During the session there will be shown techniques for standalone analysis and system’s restoration.

3. SharePoint 2010 - building a business solution - Michał Bojko
Have you ever wondered, if there is any tool that could help you solve your problems at work? If yes, You should take part in this session,as it will present methods that will support your every day work. We shall try to solve a not so easy business case with what SharePoint 2010 gives you out of the box.

4. Windows Security Management -simple or this is only an illusion? - Paula Januszkiewicz
Ideas related to new technological solutions always bring to many problems to people involved in security. On the other hand, our natural reluctance to changes makes, that everything what is related to information security, is seen as an impediment. As a result, the management of security often boils down to eliminate the problems stemming, which sources istechnology. How easy and fun is to solve some of the problems of IT security? How few clicks build safe " user-proof" solution? About this and other interesting facts related to safety management, you can learn during the session of Paula Januszkiewicz.

5. ADFS (v2) re-loaded: Keys to the kingdom - Tomasz Onyszko
Years ago, the industry has made a change and turnover the steam engine to electricity, and then from private power plants and generators to a common access network and energy suppliers. Do you wonder how to connect our system to the electric network? Probably not.
Does the same revolution await us on the web and e-services in terms of methods of authentication and access management? How in the changing conditions, services held in the "cloud" and leased server rooms manage access to them in a secure way? The session will present the changes in the approach to the problem of authentication and authorization, the architecture and solutions of ADFS version 2 services. What is STS and claims, how they are to ADFS and what constitutes a service, how to connect to infrastructure existing applications? All of this will be answered in this session.


SQL Track - Polish
1. Where SQL Trace can’t help, there use eXtended Events? - Łukasz Grala
Probably all DB administrators had to use the SQL Trace (Profiler), or systems dynamic views (DMV). And probably most of them were in situation, when it was hard to recognize problems with use of these tools, or whether such identification was not realizable. This session will show the possibility of a new solution in SQL Server 2008,which is the eXtended Events.
What are the XE? Is it something more familiar than the old solutions? Can we use eXtended Events? Which opportunities this solution offered for administrators?
The answers, not only for these questions, will be found in this session.

2. Microsoft Clustering od A do Z - Marcin Szeliga
The more complex data is, the more difficult it becomes to organize them - the classification of cases based on several attributes (eg price, color, size and brand) we made intuitively, but the classification of cases where the signatures are made up of several attributes far beyond our capacity. No wonder that Microsoft Clustering algorithm is one of the most widely used data mining algorithms for SQL Server 2005/2008.
This algorithm classifies the cases into distinct groups based on the values of their attributes, so that each group contained similar cases. In addition, it allows to estimate the probability, with which a specific case will be classified in the group. A unique feature of this algorithm is able to predict - after classifying the data of the cases can be used to predict the state of the other, assigned to the same groups of cases. For example, demographic data about customers may be used to rating the probability with which John Smith will be our customer.
During this session, we will get familiar with principles of the Microsoft Clustering algorithm, learn to create and evaluate models of clustering, and interpret their results, we will look at the use of clustering for anomaly detection (incorrect data or abnormal operation).

3. SQL Server Reporting Services - Tips & Tricks - Bartek Graczyk
Is really SSRS and BIDS allows you to flexible building and distribution reports? Do you ever thought during creating a report - perhaps with another tool it would be easier to prepare this report? But let's do that with SSRS - an excellent report and less perfect SQL Server Reporting Services. This session is dedicated to all, who had, have now, or feel, that may have a problem during working with Microsoft SQL Server Reporting Services & Microsoft Business Intelligence Studio.

4. Free applications for performance troubleshooting in SQL Server 2008 - Paweł Potasiński
SQL Server 2008 offers a powerful range of tools for monitoring activities of servers and users. However, when performance problem occurs, usually a man must decide, where the bottleneck exists or which component of the system/ which query needs optimization. There are free tools - that are not always created by Microsoft - to help the DBA make the right decisions regarding the optimization process. See their features in action. Perhaps some of these tools will join your own DBA toolkit.

5. The Key to success in the database - Marek Adamczuk
Summary: Should we use keys in a relational database? There is no doubt we should. However there is a question - what kind of key? Are natural keys better than surrogate keys, and if yes when and where should we use them? How to obtain surrogate keys? You are welcome to join the discussion of the advantages and disadvantages of this "key" decision.


Dev Track - Polish
1. IoC containers - everything what you must know to their topic - Krzysztof Koźmic, Bartosz Pampuch
The session will be carried out in the form of an interview with one of its co-authors Castle Project, Krzysztof Koźmic. During the meeting we will hear inter alia what the inversion of the control is, what purpose Dependency Injection containers are applied for in applications and what possibilities they offer. Watching a few selected projects we will learn what one should be pointed when choosing containers, as well as which mistakes to avoid using them.. We will show you some anti-patterns which we should beware of, we will give you a pieces of advice which considerably will streamline using Dependency Injection in your own project.

2. OData - exchanging the data! - Tomasz Wiśniewski
Description: The amount of data available in variety of network types from the Internet through to corporate intranets is enormous. However, the use of these data is difficult and requires a lot of effort from developers and business employees, who would easily take their decisions using this data. During this session, we will get familliar with Open Data Protocol - protocol, which aims is to simplify these problems. We'll see how you can benefit from existing network OData data sources and create your own using different technologies.

3. Windows at your fingertips - touch applications programming for Windows 7 - Szymon Kobalczyk & Freena Eijffinger
Users hearts are quickly conquered by touchscreen devices, mainly due to a much more natural way of interaction than traditional methods such as keyboard and mouse. Windows 7 was designed for this type of devices. During session I will show how developers can exploit these new capabilities into their applications, in particular written in WPF 4.0, Silverlight and Surface. I'm going to also speak about best practices for design of tactile devices.

4. Reactive Programming - a new paradigm of programming - Marcin Najder
Nowadays more and more systems created by us work in the cloud. Client while connecting using WebService is performing certain operations. Remote calls have longer time of duration than local methods, so often we are forced to perform them asynchronously. .NET Framework provides mechanisms, such as threads, APM pattern (Asynchronous Programming Model) or EAP (Event-based Asynchronous Pattern.) But the problem arises, when we want to coordinate a number of simultaneous asynchronous requests. What will happen in a situation where one of the operations will be canceled, or there is an unexpected error? Code that supports such a scenario becomes unreadable, and thus - difficult in maintenance and testing. During this session will be presenting several approaches to reactive programming, including Reactive Framework, TPL, asynchronous workflows in F # and AsyncEnumerator project.
5. Remote Services - Szymon Pobiega
The session concerns the topic of programming services in broad terms: from architectural issues through case studies of technologies (WCF, NServiceBus), and ending with real code examples. After introduction, Szymon will discuss four topics related to remote services:
Compatibility (the ability to cooperate) services. This section will discuss the different communication protocols available in WCF Web Services. The emphasis is on ease of integration with clients made in other technologies. This part will be a live demonstration of the code (Visual Studio + Fiddler).
Activation. This section will discuss the modes of activating the services (session / non-session).
Transactions. Analysis of the impact of transactions on remote services.
Interaction. Discussion (other than a query-response) modes of interaction with services (eg, one-way, one-way queue)
This session contains both parts that refer to the code (and technology) and those more oriented on systems architecture .


IT Pro Track - English
1. SharePoint 2010 - building a business solution - Michał Bojko
Have you ever wondered, if there is any tool that could help you solve your problems at work? If yes, You should take part in this session,as it will present methods that will support your every day work. We shall try to solve a not so easy business case with what SharePoint 2010 gives you out of the box.

2. Active Directory Best Practices in Hyper-V environments - Sander Berkouwer
Virtualization offers huge benefits in flexibility, cost-effectiveness and eco-friendliness. However, some design choices need to be made towards deploying Active Directory Domain Controllers in virtual environments. Some of these choices are general choices, but some of them apply to Hyper-V enabled environments specifically. Join Directory Services MVP Sander Berkouwer for this session and find out about the best practices he formulated while virtualizing Domain Controllers for the past years.

3. SQL Server User-Defined Functions - The Good, The Bad, The Ugly - Maciej Pilecki
User-defined functions are a nice feature for improving code reuse and lowering code maintenance burden. But what most developers do not know, they come with a cost. During this session we will look at different types of functions: scalar-valued and table-valued, both in T-SQL as well as SQLCLR, and their behavior and performance impact. We will go through real-life examples of how, why and when use of functions in your queries can backfire and cause performance problems. We will also establish some best practices for use of UDFs, based on the lessons learned.

4. Make Reporting Services Work For You - Jessica Moss
Are you frustrated with building reports in SQL Server Reporting Services? Tired of telling your users that you can't give them the perfect report due to limitations in the product? If so, this session will calm your nerves and make you a guru by showing how to utilize custom code and expressions to shine up your new or existing reports. Specifically, we will show how to create dynamic data groups, use paging techniques, add color and formatting, and more. This session is best suited for people with some knowledge of SSRS.


Security Track - English
1. Secure Endpoint: DirectAccess and Microsoft Forefront Unified Access Gateway 2010, the Complete Remote Access Solution - Thomas Shinder
Spend an hour learning about Microsoft’s complete remote access vision and how UAG and Direct Access Technology together provide seamless remote access to users while reducing IT risks and costs. This session includes a live demonstration of the features and the remote access solution in action!

2. Catching one tail with three heads - Kerberos explained - Tomek Onyszko
Kerberos is well established and secure authentication protocol which is being in use for many years now. Maybe because original Kerberos is being imagined as a three headed beast it is still not widely used in many organizations which struggles with simple problems which can be solved with Kerberos. It is also number one issues when it comes to user authentication in services like CRM, MOSS, SQL and ASP .NET applications.
This deep dive session is intended to explain in details how Kerberos authentication works, what is covered under the enigmatic term S4U, what PAC is and how applications are utilizing this protocol to reach the ultimate goal - single sign-on heaven. It will provide guidance on how to avoid most common pitfalls and how to troubleshoot Kerberos in case problem has occurred.
Tools, troubleshooting techniques, "tips and tricks" and references packed into single session.

3. Cybercrime: The Gathering Storm! - Andy Malone
With the dark forces of Cybercrime continuing to grow it’s critical that individuals and businesses are fully aware that doing business in the "wild west" of the 21st century can be potentially disastrous. The sophistication of the latest generation of attacks is simply mind boggling. In this hard hitting 75min session Andy Malone spills the beans on the latest tools and tactics used by the bad guys. Packed with stories, demos, tips and tricks, this is a security session you will not want to miss.

4. Killing Botnets - Christopher Davis
Killing Botnets - a talk on how YOU can help with the cleanup of the internet. This is quite a simple thing to do, so long as you have a webserver or even just a single domain. Using the data from your own access logs from your domain or server you too can help kill a botnet.

5. Password secrets revealed! Everything you want to know but are afraid to ask (or had no time to check it) - Paula Januszkiewicz
How old will be your grandchildren when you finally break your 12 character password with mid-complexity? What are the encryption methods? Where passwords are stored and how to decrypt or catch them? Everybody uses passwords, hardly anyone knows how exactly they work. Have you ever wondered what content do you share in the network? Have you ever wondered what could happen if somebody intercepted all your network transfers? In this intensive 75 min session Paula will guide through the encryption and decryption techniques being used nowadays in systems, networks and applications. You will also gain knowledge about how to secure ourselves from being fully decrypted. Be smart, be the aware administrator, know the true.




Copyright © 2010 VirtualStudy.pl. All rights reserved. Site designed & created by Daniel 'zoNE' Gabryś. Valid XHTML 1.0 | Valid CSS 3.0