3 Ways Startups Are Coming for Established Fintech Companies -- And What To Do About It
In the world of finance and financial technology, established companies are starting to look at the rearview mirror at fast-approaching startups, wondering just ...
a16z
MikroTik complete solution for ISP
MikroTik complete solution for ISP, Flávio Gomes Figueira Camacho (Vipnet Baixada Telecomunicacoes e Informatica LTDA, Brazil). Vipnet is a ...
MikroTik
Packet, routers, and reliability | Internet 101 | Computer Science | Khan Academy
Spotify engineer Lynn Root and Vint Cerf, Father of the Internet, explain how information on the Internet is broken down into packets, and how to ensure that ...
Khan Academy
AWS re:Inforce 2019: Securing Serverless and Container Services (SDD306)
Most customers are uncertain of how to secure their serverless services because these services deviate from traditional perimeter security. Additionally, many ...
Amazon Web Services
SolarWinds Network Performance Monitoring Training: NPM 12.0 Upgrade
Learn more: http://slrwnds.com/NPM12Upgrade Network Performance Monitor v12.0 Upgrade Training will cover: - New features, how to configure and use them ...
solarwindsinc
Cloud Computing - Server Clusters
Find code and diagrams at: https://www.EliTheComputerGuy.com Clustering ties multiple servers into a single logical server for users to access. Think of it like ...
Eli the Computer Guy
Grandstream GWN series WiFi Access Point Training Webinar
Check out this training webinar recording from June 13, 2017 to learn how to setup, install and manage Grandstream's GWN series of WiFi APs. One of the main ...
GrandstreamNetworks
Real-time communication with WebRTC: Google I/O 2013
Justin Uberti, Sam Dutton Presentation slides: http://io13webrtc.appspot.com 01:41 WebRTC across platforms 03:37 WebRTC APIs 04:32 MediaStream 09:44 ...
Google Developers
GOTO 2019 • In Search of the Perfect Cloud Native Developer Experience • Daniel Bryant
This presentation was recorded at GOTO Amsterdam 2019. #GOTOcon #GOTOams http://gotoams.nl Daniel Bryant - Author of "Containerizing Continuous ...
GOTO Conferences
Best Practices for Building Enterprise Grade APIs with Amazon API Gateway - AWS Online Tech Talks
To learn more, visit: https://aws.amazon.com/api-gateway/ Companies today are using APIs and RESTful endpoints to build their applications and services for ...
AWS Online Tech Talks
Shure Webinar: Networking Basics for Audio Professionals
You want a career in audio – how's your back?” has become “How's your networking skills?” More and more audio devices rely on Ethernet-based IP networking ...
Shure
Types of DDoS Attacks Explained | Arbor Networks
http://pixvid.me/ANTypesofDDoS Businesses large and small, ecommerce sites, and government institutions are all highly susceptible to Distributed Denial of ...
ArborNetworks
vSAN 7 Technical Overview
This video provides a technical overview of VMWare vSAN, including the new features and enhancements found in vSAN 7.
VMware vSAN
How can banks be used to stop human trafficking? | The Economist
Human trafficking is devastating for the victims but low-risk for the criminals, whose activities are largely hidden from view. To disrupt it, law enforcement is ...
The Economist
AWS re:Invent 2018: [REPEAT 2] Serverless Architectural Patterns and Best Practices (ARC305-R2)
As serverless architectures become more popular, customers need a framework of patterns to help them identify how to leverage AWS to deploy their workloads ...
Amazon Web Services
VMware Validated Designs Architecture Foundations
In this video, Ryan Johnson (SDDC Technical Marketing) provides an overview of the architecture foundations and concepts in the VMware Validated Design ...
VMware
Swatting NATs with TURN and WebRTC
Chad Hart of webrtcHacks provides a review of NAT traversal in WebRTC. TURN servers are a required element in real WebRTC deployments to help make ...
Kranky Geek
Command Line Basics for Ethical Hacking
In this video we will cover some basic Windows and Linux command line operations. As most pentesters attest, command line mastery is a key component of ...
Infosec
OpenShift 4 Release Update
OpenShift
Standing Army (Global Documentary) | Real Stories
Over the course of the last century, the US has silently encircled the world with a web of military bases unlike any other in history. No continent is spared.
Real Stories
Network Insight for F5 BIG-IP Performance Monitoring
Learn more: http://bit.ly/NetworkInsightforF5 SolarWinds® Network Performance Monitor's Network Insight provides comprehensive monitoring of F5® BIG-IP® ...
solarwindsinc
SolarWinds Security Software - Log & Event Manager
For more information: http://bit.ly/LEMsecurity Watch this short video covering SolarWinds Log & Event Manager's key security features. You will learn quickly ...
solarwindsinc
Web Protection: Complete Web Protection on Your Firewall? Think Again.
This webinar reviews the advanced features you should look for in web protection solutions to address the common challenges of today and tomorrow including: ...
McAfee
Weekend Projects - Internet Kill Switch
Complete instructions for this episode of Weekend Projects can be found at http://makezine.com/projects/internet-kill-switch/ Whether you don't want to leave ...
Make:
Deep Dive into firecracker-containerd
Amazon recently released the Firecracker Virtual Machine Manager (VMM) built on top of the Linux KVM subsystem, which is optimized for lightweight, ...
Docker
Pompeii: Life And Death With Mary Beard (Ancient Rome Documentary) | Timeline
Pompeii: one of the most famous volcanic eruptions in history. We know how its victims died, but this film sets out to answer another question - how did they live?
Timeline - World History Documentaries
Howto repair switch mode power supplies #6: Basics of Linear Regulators and voltage references
In the sixt video of the Switch Mode Power Supply (SMPS) repair series we look at the basic ideas and priciples of operation of linear serial regulators.
Donkey Learning IT
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
Get my: 25 hour Practical Ethical Hacking Course: https://www.udemy.com/course/practical-ethical-hacking/?referralCode=4A7D5EE973AFBCAD11C6 ...
The Cyber Mentor
Mini Countries Abroad: How Embassies Work
Get a 30-day trial, 1 Audiobook, and 2 Audible Original for free at http://Audible.com/wendover Or, text, “wendover” to 500 500 Subscribe to Half as Interesting ...
Wendover Productions
TSHOOT VLAN SWITCH Problems Part 1
http://www.trainsignal.com/Cisco-CCNP-TSHOOT-Training.aspx?utm_source=YouTube&utm_medium=Social%2BMedia&utm_content=Petri&utm_campaign= ...
Pluralsight IT - Training Archive
Developing Serverless Application on AWS
AWS Public Sector Summit 2018 - Washington, D.C. Serverless computing allows developers to build and run applications and services without thinking about ...
Amazon Web Services
CyberArk Leveraging CyberArk for Traditional and Ephemeral Application Secrets Management
From J2EE-based application servers, to RPA and automation tools, to microservices running on containers-- robots are being given more privilege and access ...
Tech Field Day
Launch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
Level 200 | Getting Started with AWS Learn about the AWS Landing Zone (https://aws.amazon.com/answers/aws-landing-zone/), a solution that helps customers ...
AWS Online Tech Talks
Security And Microservices - Sam Newman
Microservices are all the rage, and so are security breaches! Learn what you can do to create one without the other. Microservices give us many options. We can ...
NDC Conferences
RMF, DISA STIGs, and NIST FISMA Compliance using SolarWinds
Learn more about SolarWinds Federal Program here: http://bit.ly/FedRMFWebcast . Learn how to use SolarWinds products to improve your agency's Risk ...
solarwindsinc
Ransomware Webinar
In this webinar we go over Ransomware and best practices to prevent it. We will review all levels of protection available including product demos, and how to ...
Trend Micro
Network Troubleshooting: Virus in a Haystack - SolarWinds Lab #1
Learn more: https://slrwnds.com/SW-Lab-1 In this episode, Head Geeks Patrick Hubbard and Lawrence Garvin look at a very puzzling hospital network where a ...
solarwindsinc
Insecure Transit - Microservice Security - Sam Newman
A deep dive into some of the technical challenges and solutions to securing a microservice architecture. Microservices are great, and they offer us lots of options ...
NDC Conferences
Webinar: Meraki for Hybrid Networks
Many Meraki customers operate hybrid networks, containing equipment from more than one vendor. This webinar explores how customers benefit from Meraki ...
Cisco Meraki
CompTIA Cloud Essentials Basic Training for Cloud Computing - Webinar
http://www.nhls.com - With New Horizons IT Technical, Applications & Business Training, we empower people around the world to succeed through learning.
NH Learning Solutions
Building a Bank with Kubernetes by Oliver Beattie, Monzo
Building a Bank with Kubernetes - Oliver Beattie, Monzo "In this talk Oliver Beattie, Head of Engineering at European startup bank Monzo, explores how they are ...
CNCF [Cloud Native Computing Foundation]
Implementing Cisco UCS Part 1
In this video, Anthony Sequeira of StormWind.com walks through some of the keys to a Cisco UCS implementation.
StormWind Studios