I have put together my schedule for TechEd 2013 and will share it in this blog post, what are your thoughts. Did I miss any good sessions here or do you have any recommendations?
Subject | Start | End | Duration |
Lessons from the Field: Useful Hacker Techniques for Administrators | 24-06 09:00 | 24-06 17:00 | 480 |
The Cloud OS: It?s Time! | 25-06 09:00 | 25-06 10:30 | 90 |
Transform the Datacenter with Server and Management Innovations from Microsoft | 25-06 11:00 | 25-06 12:00 | 60 |
Big Data. Small Data. All Data. | 25-06 11:00 | 25-06 12:00 | 60 |
Advanced Automation Using Windows PowerShell | 25-06 13:30 | 25-06 14:45 | 75 |
Desired State Configuration in Windows Server 2012 R2 PowerShell | 25-06 15:15 | 25-06 16:30 | 75 |
Windows PowerShell Unplugged | 25-06 17:00 | 25-06 18:15 | 75 |
APTs: Cybercrime, Cyber Attacks, Warfare and Threats Exposed | 26-06 08:30 | 26-06 09:45 | 75 |
Desired State Configuration with Windows Server 2012 R2 | 26-06 10:15 | 26-06 11:30 | 75 |
Infrastructure Services on Windows Azure: Virtual Machines and Virtual Networks with Mark Russinovich | 26-06 10:15 | 26-06 11:30 | 75 |
The Inside Man: Surviving the Ultimate Cyber Threat | 26-06 10:15 | 26-06 11:30 | 75 |
Overview of Windows Server 2012 Hyper-V | 26-06 12:00 | 26-06 13:15 | 75 |
Practical Implementation of Windows Server 2012 Storage Technologies | 26-06 14:00 | 26-06 14:45 | 45 |
Windows Azure Internals | 26-06 15:15 | 26-06 16:30 | 75 |
Tuning Images for VDI Usage | 26-06 15:15 | 26-06 16:30 | 75 |
Storage and Availability Improvements in Windows Server 2012 R2 | 26-06 17:00 | 26-06 18:15 | 75 |
Designing a Virtual Desktop Infrastructure Architecture for Scale and Performance on Window Server 2012 | 26-06 17:00 | 26-06 18:15 | 75 |
Windows is the Future | 27-06 08:30 | 27-06 09:45 | 75 |
Microsoft Integration Vision and Roadmap | 27-06 10:15 | 27-06 11:30 | 75 |
Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation | 27-06 10:15 | 27-06 11:30 | 75 |
Running Your Active Directory in Windows Azure Virtual Machines | 27-06 10:15 | 27-06 11:30 | 75 |
Managing Multi-Hypervisor Environments with Microsoft System Center 2012 | 27-06 10:15 | 27-06 11:30 | 75 |
Hackers (Not) Halted (repeats on 6/27 at 5 pm) | 27-06 12:00 | 27-06 13:15 | 75 |
Building Hosted Clouds Using Windows Server 2012 R2 | 27-06 12:00 | 27-06 13:15 | 75 |
Configuring and Tuning Windows 8 | 27-06 12:00 | 27-06 13:15 | 75 |
Deploying Windows 8 and Touch in the Enterprise | 27-06 14:00 | 27-06 14:45 | 45 |
Automating Microsoft System Center Deployment with the PowerShell Deployment Toolkit | 27-06 15:15 | 27-06 16:30 | 75 |
Pieces of 8: Prospecting for Windows 8 Gold | 27-06 15:15 | 27-06 16:30 | 75 |
Integrating with Microsoft System Center 2012 and Windows PowerShell | 27-06 17:00 | 27-06 18:15 | 75 |
Sysinternals Primer: TechEd 2013 Edition | 27-06 17:00 | 27-06 18:15 | 75 |
What?s New in Windows 8.1 Security: Overview (repeated from 6/26 at 8:30 am) | 27-06 17:00 | 27-06 18:15 | 75 |
Hackers (Not) Halted (repeated from 6/27 at 12:00) | 27-06 17:00 | 27-06 18:15 | 75 |
Using Windows PowerShell Magic to Manage Microsoft Office 365 | 28-06 08:30 | 28-06 09:45 | 75 |
Adventures in Underland: What Passwords Do When No One Is Watching | 28-06 08:30 | 28-06 09:45 | 75 |
Deep Dive on Hyper-V Network Virtualization in Windows Server 2012 R2 | 28-06 08:30 | 28-06 09:45 | 75 |
License to Kill: Malware Hunting with the Sysinternals Tools | 28-06 10:15 | 28-06 11:30 | 75 |
Better Networking, More Net Gains: How Windows Server 2012 Can Be Your Director of Protocol(s) | 28-06 12:00 | 28-06 13:15 | 75 |
Windows 8: Essential Security Features Every Admin Should Know About | 28-06 12:00 | 28-06 13:15 | 75 |
Case of the Unexplained 2013: Windows Troubleshooting with Mark Russinovich | 28-06 12:00 | 28-06 13:15 | 75 |
Windows Server 2012 Deployment and Ongoing Management: Why Server Core Is Right for You | 28-06 14:45 | 28-06 16:00 | 75 |
Upgrading the Platform – How to Get There! Part 2: Networking Infrastructure and Management | 28-06 14:45 | 28-06 16:00 | 75 |
What?s New in Windows 8.1 Security: Modern Access Control Deep Dive | 28-06 16:30 | 28-06 17:45 | 75 |
Live Demonstration: Hacker Tools You Should Know and Worry About | 28-06 16:30 | 28-06 17:45 | 75 |