Dell EMC Unity Product Overview and Architecture with Kaushik Ghosh
Kaushik Ghosh, Senior Management, Product Development with Dell EMC Unity, gives a product overview of their line. This includes their all-flash arrays, ...
Tech Field Day
Deployment Series Episode 2: The top 5 tips for deploying G Suite for Education
The second video in our deployment series, helping schools get set up quickly and easily with Google for Education tools. This second episode features the top ...
Google for Education
What's new in control groups (cgroups) version 2?
Michael Kerrisk https://2019.linux.conf.au/schedule/presentation/124/ Control groups (cgroups) version 1 was released in 2008, and within a short time people ...
linux.conf.au
Conversational AI and human agents working together
Many customer care systems combine conversational AI with live agents. Users may want to talk to a live agent either because the bot does not understand the ...
Microsoft Developer
Napoleon Bonaparte: Crash Course European History #22
We try not to get into too much great man history here at Crash Course, but we have to admit: Napoleon Bonaparte is a pretty big deal. Join us as we track the ...
CrashCourse
Fluentd: Cloud Native Logging - Yuta Iwama, Arm Treasure Data & Masahiro Nakagawa, Arm Treasure Data
Join us for Kubernetes Forums Seoul, Sydney, Bengaluru and Delhi - learn more at kubecon.io Don't miss KubeCon + CloudNativeCon 2020 events in ...
CNCF [Cloud Native Computing Foundation]
Dynamics 365 Customer Insights demo | Business Applications April 2019 Release
Take a look into new Customer Insights capabilities added during Business Applications April 2019 Launch that help you engage customers, empower ...
Microsoft Dynamics 365
Advanced Data Security with Azure SQL Database in Azure Government
In this episode of the Azure Government video series, Steve Michelotti sits down to talk with Ajay Jagannathan of the Azure SQL Database Engineering team, ...
Microsoft Azure
GOTO 2016 • Phoenix a Web Framework for the New Web • José Valim
This presentation was recorded at GOTO Copenhagen 2016 http://gotocph.com José Valim - Creator of the Elixir programming language and co-founder of ...
GOTO Conferences
Oracle Database 18c New Security Features
Held on August 9 2018 In this AskTOM session Russ Lowenthal focuses on new security features in Oracle Database 18.3 - recently released for on-premises ...
Oracle Developers
C++Now 2017: Michael Caisse “Networking TS Workshop (part 1 of 2)"
http://cppnow.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: ...
CppNow
Working & Learning from Home: AWS Solutions for Remote Employees, Students, & Contact Center Agents
With people in many cities and countries now being asked to work or learn from home, organizations are increasingly looking for options to make that work ...
AWS Online Tech Talks
Introducing Multi-Geo capabilities in Office 365 and how to configure them
See the capabilities of Multi-Geo in Office 365 which allows you to determine, where your data resides within a single Office 365 tenant across multiple regions ...
Microsoft Mechanics
Detecting Threats in Logs at Cloud Scale (Cloud Next '19)
Google has protected its corporate and production environments by analyzing logs for over a decade. In this talk, we'll give an overview of how Event Threat ...
Google Cloud
MS Build SK108 Microsoft Graph data and services – a deep dive for developers
Microsoft Graph is the API that describes the patterns of identity, productivity and security in organization around the world. Join us for a deep dive into the data ...
Microsoft 365 Developer
AWS re:Inforce 2019: How to Secure Your Active Directory Deployment on AWS (FND306-R)
Many enterprises use Active Directory for authentication, server and workstation management, group policy management, and more. It's also one of the first ...
Amazon Web Services
SYN328 - Federated Authentication Service, SAML with XenApp and XenDesktop
New in XenApp and XenDesktop 7.8, Federated Authentication Service enables authentication from worlds outside the username/password/smartcard set ...
Citrix
Populism in Southeast Asia and Turkey
Harvard Law School Clinical Instructor Yee Htun; Richard J. Heydarian, an international affairs commentator and journalist; and Jamie O'Connell, lecturer at the ...
Harvard Law School
How service providers can manage their customers in the Azure portal
In this video, learn how Managed Service Providers can easily manage their customer assets from within their environment. Once the customer is onboarded to ...
Microsoft Azure
Oracle Training: Introduction to Oracle Database 19c: New Features & Benefits Webinar
Get a $100 Amazon gift card when you refer a friend: https://www.exitcertified.com/training/savings/rewards View Oracle Training Courses: ...
ExitCertified
35C3 - Kernel Tracing With eBPF
https://media.ccc.de/v/35c3-9532-kernel_tracing_with_ebpf Unlocking God Mode on Linux Have you ever wanted to trace all syscalls or dump all IPC traffic ...
media.ccc.de
Introducing privileged access management in Office 365
In this demonstration, we'll introduce the new Privileged Access Management capabilities in Office 365, that allows you to control admin privileges within your ...
Microsoft Mechanics
Brief overview of Azure Cost Management and Cloudyn
In this video, you will get a brief overview of Azure Cost Management and Cloudyn, and when to use each product. Learn more: ...
Microsoft Azure
Security configuration in Microsoft Defender ATP
Microsoft Endpoint Manager is a central place to manage the configuration of organizations' devices. In this video, you'll learn how to use it to manage security ...
Microsoft 365
Meet compliance and manage risk with Advanced Data Governance
Data is growing in volume and variety in today's modern workplace. Learn how simple, integrated and intelligent data governance in Microsoft 365 can help you ...
Microsoft 365
ТОП-? изменений 2020 года: карантин и не только ⚠️ | Factor Academy
Получить полную запись семинара с выступлениями всех лекторов https://bit.ly/2yUHm7N Налоговые изменения валят как из рога изобилия. Но если ...
Factor.Academy - Первый бухгалтерский канал
Advanced Zeek Usage Scripting and Framework
The open-source Network Security Monitor (NSM) and analytics platform Zeek (formerly known as Bro) became well-known in the information security industry ...
SANS Digital Forensics and Incident Response
Learn how to drive your projects to success with Zoho Cliq - Zoho Projects Integration
Collaboration is crucial to a project's success. Often, we find our communication channels and information spread across various tools we use. All you need is ...
Zoho
Hosted UniFi Controller Setup on Vultr
How to set up a hosted UniFi Controller on Vultr. Sign up for Vultr here: https://www.vultr.com/?ref=7803228-4F Blog post: ...
Crosstalk Solutions
Stripe Sessions 2019 | Hacking conversion for fun and profit
Get a behind-the-scenes look at the hidden art of improving customer conversion. Learn new ideas on optimization experiments, quick wins your team can apply ...
Stripe
Citrix Synergy TV - SYN229 - nFactor and Login Schemas...
Citrix Synergy TV - SYN229 - nFactor and Login Schemas: the future of NetScaler customization With earlier versions of NetScaler firmware, administrators ...
Citrix
Security Best Practices for Serverless Applications - 2017 AWS Online Tech Talks
Learning Objectives: - Learn security best practices for AWS Lambda and Amazon API Gateway - Understand how to use Amazon Cognito to build identity and ...
AWS Online Tech Talks
VMware Workspace ONE Access: ADFS Integration - Feature Walk-through
Important: This video is dated, but it still contains relevant and valuable information. In this video, learn how to integrate VMware Workspace ONE Access ...
VMware End-User Computing
AWS re:Invent 2018: Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1)
Application modernization projects with AWS start with creating an AWS Landing Zone. Based on AWS best practices, AWS Landing Zones help ensure a ...
Amazon Web Services
How to secure and protect web applications using Oracle Access Manager and Webgate
In this video, I will explain the basic request flow of OAM (Oracle Access Manager) and basic OAM terminology. I will show a demo on how to protect web ...
Prasad Domala
R80.10 Identity Awareness- DemoPoint Academy
This Video is a demo of R80.10 Identity Awareness that focuses on the different feature set and capabilities for our customers. For more information visit ...
Check Point Software Technologies, Ltd.
What is Azure Monitor?
Monitor, diagnose, and gain insight into the performance and availability of your applications and services with Azure Monitor. In this video, you'll learn how to ...
Microsoft Azure
Dynamics 365 Essentials for IT | Intro
An explanation of the Dynamics 365 components, underlying architecture, and the possible integrations with your existing data, apps, and business processes.
Microsoft Mechanics
Best Practices for Storage Classes, Reliability, Performance and Scalability (Cloud Next '18)
So you have data and you serve applications, systems or people who access it. Depending on what kind of data you have and what kind of workload you're ...
Google Cloud Platform
Introduction to NSX Cloud (NET1516BU)
VMware NSX Cloud provides a single pane of glass for managing the security for your entire hybrid cloud across AWS, Azure, and on-premises.
VMware NSX
VMware Workspace ONE and their future EUC vision explained by Johan van Amersfoort and Brian Madden
Modern Management with VMware Workspace ONE? In this 'lightboard' video Johan van Amersfoort, Technologist EUC, AI & IoT at ITQ Consultancy, and Brian ...
ITQ Consultancy
Вебинар Siemens PLM: Прототип стандартного решения на базе Teamcenter Manufacturing
Сделан обзор работ, выполненных/выполняемых по развитию технологического прототипа стандартного решения (ПСР): • Настройка модели данных ...
Siemens Software