Skip to main content

The Hybrid Cloud: Top 3 at Sessions for IT Pros at Microsoft Tech Summit

Microsoft’s hybrid cloud offerings enable you to choose how, when and what you want to move to the cloud. Since the launch of our Canadian datacentres in May 2016, we’re proud to offer a secure local cloud that can help businesses across all industries scale with efficiency. This year, we’re bringing our top engineers from Redmond to Toronto to provide hands on training for IT pros at the Microsoft Tech Summit. Here is a sneak peek into the top three sessions to attend if you’re an IT pro looking to move to the cloud or perfect your skills within it.

1 . Dive deep into Azure Container Service

Microsoft Azure Container Service optimizes the configuration of popular open source container tools and technologies on Azure. We will take a deep dive into the service and the components found within it. We will examine how they come together to provide a highly scalable and resilient environment for your Linux containers (Windows in private preview). Finally, we’ll explore a demo application that will neatly illustrate why Azure Container Service is important to any company.

2. Dive deep into Operations Management Suite for applications and infrastructure

With Operations Management Suite you can take advantage of the power of Azure to manage and secure your IT environment, in the cloud and on-premises. Explore the deep capabilities of OMS that enable you to gain visibility into key workloads, automate tasks and ensure consistent configuration, troubleshoot issues and address security threats faster. You will see how cloud-based backup and disaster recovery can help you ensure the availability of your apps and data.

3. Explore Microsoft Windows Server 2016 Security

This foundation session will walk you through the current threat environment and the security principles guiding principles that Microsoft used for building Windows Server 2016. Windows Server 2016 delivers layers of protection that help address these emerging threats so that the server becomes an active component in your security defenses. These security protections were built with the mindset of how we deal with the overall threat of ongoing attacks inside the datacenter environment and range from threat resistance and enhanced detection to managing privileged identity and protecting virtual machines from a compromised fabric.

Be sure to check out the Microsoft Tech Summit sessions agenda before you go. Which are you most looking forward to attending? Tweet us – we would love hear more about your expectations for 2016! See you at the Summit.