Build a Cloud – 1

This module provides an overview of functional requirements and how to plan the Cloud Fabric. It also addresses the requirements for multi-tenancy and how to plan your cloud infrastructure on Windows Server 2012.

  • Audience and functional requirements
  • Planning the cloud fabric
  • Service delivery and automation

Full course outline:

Build a Cloud – 2

In this session you will learn how to configure the storage layer, physical and virtual network. In addition it covers bringing the hypervisor under management.

  • Configuring the storage layer
  • Physical network
  • Configuring virtual networking
  • Bringing the Hypervisor under management

Full course outline:

Microsoft Power Platform | Apps

How to build intelligent, cross-device apps with little to no code, here is a demo by Microsoft’s, Charles Lamanna

Now you can use the Power Platform to build low to zero code, intelligent, scalable, and automated, cross-device apps in a fraction of the time. You’ll see a demonstration of the latest updates from AI Builder to help you to more easily infuse intelligence into your apps and processes. Plus, check out Robotic Process Automation, for next-gen user interface automation, that uses machine learning to modernize how you can now interact with your legacy apps. At Microsoft Ignite 2019, this was session THR2274: Microsoft Power Platform: Going under the hood of Microsoft Dynamics 365, PowerApps, Microsoft Flow, and Power BI with Charles Lamanna. Charles Lamanna is the Corporate Vice President for Citizen Application Platform. This includes PowerApps, Microsoft Flow, Common Data Service, AI Builder, and the Dynamics 365 Platform. Charles has worked across many products at Microsoft, including Exchange Online, Microsoft Azure, and Dynamics 365. Charles originally joined Microsoft in 2013 when MetricsHub, a company he founded, was acquired by Microsoft and integrated into Microsoft Azure.

SQL Server 2019

Microsoft SQL Server 2019DevOps, the cloud, and new database technologies mean our jobs as database administrators (DBAs) are changing at an ever-faster pace. If you’re fascinated by data and all the things you can do with it, it’s a thrilling time to be in the business. Here are five of the skills we see as essential parts of the modern DBA’s toolkit.

  1. Expertise with multiple technologies: The one-size-fits-all approach to databases is fading. Just as application developers are moving toward a microservices model that focuses on the right tool for the job, organizations are choosing databases according to specific workload needs. The more you know about Hadoop, NoSQL, graph, and other technologies, the better-positioned you will be to make a positive contribution to the conversation.
  2. Collaboration: Speaking of conversations, DBAs will increasingly need to become contributing members of application teams rather than siloed specialists off in their own corners. DevOps tend to break down the barriers between IT functions. Understanding how applications work, and, even better, how they deliver business value, puts you in a position to be a creative problem solver and all-around data expert.
  3. Data science skills: Machine learning and AI are some of the fastest growing uses of data in the enterprise today. Making these technologies work efficiently and getting superior results depends on good data, which depends on you and your specialized skills.
  4. Cost optimization: In an on-premises world, most DBAs aren’t deeply involved in cost conversations unless there’s a big IT capital investment taking place. In the cloud, database configuration has a direct impact on the bottom line. Understanding how to manage the technology in cost-optimized ways can help your organization do more with its IT budget.
  5. Cloud (and edge) everything: There will be on-premises databases around for a long time, but the cloud is going to continue growing in importance. The good news is that it can help automate a lot of the infrastructure-related drudgery that characterizes classic DBA jobs. The even better news is that it frees you to do more creative things. In many industries such as retail, manufacturing, and aerospace, edge computing is becoming even more interesting than cloud and requires further evolution of database approaches. If you’re an expert here, you can write your own ticket for several years to come.

IT has always been a fast-evolving field and it’s only going to accelerate for DBAs. Now’s the time to skill up and take the lead. To learn more about what you can do with Microsoft SQL Server 2019, check out the free Packt guide, Introducing Microsoft SQL Server 2019. If you’re ready to jump to a fully managed cloud solution, check out the Essential Guide to Data in the Cloud.

Bose Soundlink

Bose Soundlink Micro

Bose (bluetooth) Soundlink Micro, I have just purchassed a new Surface Laptop 2 to replace my Surface Pro 4. The transfering of date from my old Surface Pro to the new Laptop 2 went according to plan. I was able to test most things before my next trip to Edmonton to train the final course CompTIA Security + for the 3rd intake.

During my presentation I needed to play a video to the class and I connected my Bose (BT) Soundlink Micro, well what can I say, there was absolutly no volume, so I had to revert back to my build in speakers. The volume was enough for the students to hear the content but nowhere like it should have been, had my Bose speaker been working.

After much testing on various devices I proved that the issue was with my new Surface Laptop. How very sad, searching online for a solution I quickly realised that hundreds of people had the same issue with different hardware, something that Bose themselves had not yet been able to resolve. Realising that it could not be my Laptop, I of course couldn’t give up and revert to the Surface pro. I have just gotten used to the slightly larger screen of the Laptop 2. After many hours I found an inconspicuous post that said we had to add a registry setting. Me I had to check this first in the registry myself, and found setting was already there but needed to have its value changed from 1 to 0.

Below is the command to add the registry entry, but as I said above my entry already existed, so all I did was change the DisableAbsoluteVolume REG_DWORD to 0

reg add HKLM\SYSTEM\ControlSet001\Control\Bluetooth\Audio\AVRCP\CT /v DisableAbsoluteVolume /t REG_DWORD /d 0 /f

Once that had been changed my volume was back to loud.

I can now go back to Edmonton and not have to worry about the volume when showing videos.

Outlook View

I use Outlook daily and I do not want the preview pane when I look at my emails. Its easy enough to change the view by going to the view tab and setting the reading pane off, however when you have a fully structured inbox with various folders the reading pane off setting does not propagate to all folders, so here is a tip on how to change this. Do remember that you can change to any view and propagate the view to all folders using this way.

In the Ribbon on the View tab is where it all happens. Once you have changed the layout by using the option in the layout group of the view tab you are ready to proceed with the propagation to all folders and any other mailboxes.

Select the dropdown next to the Change view and click the Apply Current View to Other mail Folders this should open up the selection box.

In the Apply View selection, check the boxes where you want to propagate the view to and then at the bottom of the view you will see another checkbox for the Apply the View to Subfolders.

login Issues

There are over 300 million fraudulent sign-in attempts to the Microsoft cloud services every day. Cyberattacks aren’t slowing down any time in the near future, and it’s worth noting that most attacks have been successful simple means. It only takes is one compromised set of credentials (user name/password), a legacy or an unpatched application to cause a data breach. This shows how critical it is to ensure password security and a strong authentication process.

Learning about common vulnerabilities and the single most important action that you can take to protect your accounts from attacks is MFA.

Common vulnerabilities

  • Business email compromise, an attacker can gain access to a corporate email account, through phishing or spoofing, and can use it to exploit a system for many reasons. Accounts protected with only a user account and password are the easiest to compromise.
  • Legacy protocols can create a major vulnerability because applications that use basic protocols, such as SMTP, were not designed to manage Multi-Factor Authentication (MFA). So even if you require MFA for most use cases, attackers will search for opportunities to use outdated browsers or email applications to force the use of less secure protocols.
  • Password Usage, Considering that up to 73 percent of passwords are duplicates, this has been the most successful strategy for many attackers and it’s easy to do. The process of password spray and credential stuffing attacks make it easy to compromise a system. Common passwords and credentials compromised by attackers in public breaches, social media share and tell sessions are used against corporate accounts to try to gain access.

Multi Factor Authentication (MFA)

What you can do to protect your organization

You can help prevent some of these attacks by banning the use of bad passwords through group policies and enabling a stricter password policy, blocking legacy authentication, and training employees on phishing attacks. However, one of the simplest and most effective things you can do is to just turn on MFA. By providing an extra barrier and layer of security that makes it incredibly difficult for attackers to get past, MFA can block over 99.9 percent of account compromise attacks. With MFA enabled, knowing or cracking the password won’t be enough to gain access.

According to the SANS Software Security Institute there are two primary obstacles to companies adopting MFA implementations today:

  1. A misconception that MFA requires external hardware devices.
  2. Concerns about potential user disruption or concern over what may break.

Matt Bromiley, a SANS Digital Forensics and Incident Response instructor, says, “It doesn’t have to be an all-or-nothing approach. There are different approaches your organization could use to limit the disruption while moving to a more advanced state of authentication.” These include a role-based or by application approach—starting with a small group and expanding from there. Bret Arsenault shares his advice on transitioning to a passwordless model in Preparing your enterprise to eliminate passwords.

Passwordless authentication technologies are not only more convenient for end users but are extremely difficult and costly for hackers to compromise. Learn more about Microsoft passwordless authentication solutions in a variety of form factors to meet user needs.

Server Technician

What Is a Server Support Technician?

A server support technician manages, repairs and analyzes an organization’s servers, making sure everything is running, up to date and secure.

Other duties of a server support technician may include the following:

  • Running routine security and vulnerability scans
  • Assemble and install physical hardware as and when required
  • Maintain an accurate inventory of equipment and connections
  • Oversee the disposal of obsolete and sensitive equipment
  • Install and support software packages
  • Operate and monitor complex computer systems, and network infrastructure
  • Know the different server types; Authentication, database, mail, web, file and print, virtual and host servers

A server technician needs to analyze the performance of an organization’s servers and resolves any issues that may arise. Someone in this role should have great problem-solving skills and be highly knowledgeable in Windows and other Server Operating systems. They are also responsible for installing hardware, racks and operating systems.

Many technical staff may work remotely and on a contractual basis, working where the problems occur. Strong verbal and written communication skills are an essential requirement for this position. People in this role must be able to work independently, with minimal to no supervision. Some of these people may very well end up as server or network design architects.

Clip board

Do more with your New Windows 10 (May update) Clipboard.
Discover an easy way to pull up a history of the past 25 things you’ve copied, including URLs, text from web pages and docs—and even screenshots.
First go to your settings, > system > Clipboard
Enable the Clipboard History (1).

You can now use The (Windows key) & V to open the clipboard and choose what to past, up to 25 clips. Remember that you can still use the (Ctrl) & V to do a regular past.
If you are logged in using your Microsoft account the clipboard will work across all devices (2).
See the screen clip to see all options (3).