[tabby title=”Course Overview”] In a partnership agreement with Pragmatic Works, SSWUG.ORG’s virtual class, PowerPivot for Techies is an intensive course that is designed to get you up to speed using PowerPivot quickly and productively. You will start from basic concepts and move to complex data models and DAX formulas. In addition, this course covers creating and deploying tabular data […]
Author: Tim Russell
Online Course: SharePoint 2010 Administration
[tabby title=”Course Overview”] Great SharePoint Administrators must hold unique traits to set themselves and their work apart from others. This class is designed to take you to the next level in your understanding of SharePoint. We use a variety of lab exercises to ensure lecture sessions are backed up by hands on experience. With the instruction in the course, […]
Online Course: Introduction to Windows Azure
[tabby title=”Course Overview”] SSWUG.ORG’s virtual class will provide you with the knowledge of Window Azure’s components and aspects to run applications without the expense needed to maintain the hardware and save money on licensing costs. Scott Klein, who is a Microsoft SQL Azure MVP and the co-founder of Blue Syntax Consulting, will showcase the different types of services that […]
Online Course: Mastering SQL Azure
[tabby title=”Course Overview”] When SQL Azure first came on the scene there was a huge misconception that it was just another NoSQL type of database. Scott Klein, an Microsoft SQL Azure MVP, will provide you with an introductory look at the overall architecture of SQL Azure and many of the great features and benefits that SQL Azure provides. With […]
Online Course: The Accidental DBA: Understanding the Core Necessities with SQL Server
[tabby title=”Course Overview”] In SSWUG.ORG’s virtual class, conducted by Microsoft SQL Server MVP Stephen Wynkoop, you will be able to receive the information need in the real world for working with SQL Server. For the non-formally trained “Accidental DBA”, Stephen will center on learning experiences, how-to information and specific demonstrations and labs that will let you explore […]
Six Steps to Managing Data Quality with SQL Server Integration Services
Overcoming the challenges of data quality doesn’t have to be costly or difficult to do. Organizations can take advantage of the integration capabilities inherent in Microsoft’s SQL Server Integration Services (SSIS) to implement a Total Data Quality strategy needed for successful MDM, data warehousing and data quality projects. This white paper describes a six-step plan to managing data quality using […]
Azure Encryption
As soon as you have data stored for later reference, you are faced with the challenge of protecting that data. This essentially includes every piece of information – certainly those that are personally identifiable or relate to activities that require compliance and protection of information. That’s quite a wide array of information, and it’s important to make sure you’re doing […]
SQL KeyManagement
ORGANIZATIONS CONTINUE TO EXPERIENCE DAMAGING LOSSES DUE to data breaches. These losses include legal costs, costs to reimburse customers and employees, lost stakeholder value, and reduction of goodwill. The estimate of these financial losses range into the billions of dollars every year. This paper discusses compliance regulations, standards for protecting data with encryption, and how Microsoft provides for the encryption […]
Industry Must Haves Key Management
DATA SECURITY HAS COME A LONG WAY within just the past few years. Organizations no longer have to continue to maintain current patchwork methods because there are no available, cost-effective, or interoperable solutions that easily solve their problems. Encryption and encryption key management are now industry standards and work across both legacy and newer business systems, multi-platform and multi-tenant networks, […]
Security Challenges and Considerations with VMware
Applying security in a virtualized environment introduces some unique challenges for key management, from managing to compliance regulations and other considerations. When systems are no longer dedicated and share a common physical architecture, the issues of access and encryption controls is critical. In this paper, we’ll look into some of these challenges and address some of the things you can […]