Hyperspace: An Indexing Subsystem for Apache Spark
At Microsoft, we store datasets (both from internal teams and external customers) ranging from a few GBs to 100s of PBs in our data lake. The scope of analytics ...
Databricks
Introduction to jBPM | jBPM Components | jBPM Architecture | jBPM Tutorial | Intellipaat
This jBPM online video helps you to learn following topics: 00:43 - jbpm suite key components 05:25 - jbpm architecture 06:28 - jbpm.org 20:19 - jbpm quiz If ...
Intellipaat
Windows Virtual Desktop updates for admins (2020)
See the admin-focused updates to Windows Virtual Desktop for the first half of 2020. Starting with the brand new Windows Virtual Desktop admin center, we'll ...
Microsoft Mechanics
A Planned Methodology for Forensically Sound IR in Office 365 - SANS DFIR Summit 2018
A planned methodology for developing and implementing a forensically sound incident response plan in Microsoft's Office 365 cloud environment must be ...
SANS Digital Forensics and Incident Response
Building Robust Production Data Pipelines with Databricks Delta
Most data practitioners grapple with data quality issues and data pipeline complexities—it's the bane of their existence. Data engineers, in particular, strive to ...
Databricks
Advanced Zeek Usage Scripting and Framework
The open-source Network Security Monitor (NSM) and analytics platform Zeek (formerly known as Bro) became well-known in the information security industry ...
SANS Digital Forensics and Incident Response
How to set up a direct interconnection between Azure and Oracle Cloud Infrastructure | Azure Friday
Romit Girdhar (Microsoft) and Chinmay Joshi (Oracle) join Lara Rubbelke to explain how to interconnect Microsoft Azure and Oracle Cloud Infrastructure.
Microsoft Azure
Google Cloud Next '19: Day 2 Product Innovation Keynote
Urs Hölzle, SVP, Technical Infastructure, 1:19 Deepti Srivastava, Product Manager, Cloud Databases, 18:45 Justin Arbuckle, Scotiabank, SVP, 25:44 Julie Price, ...
Google Cloud Platform
Azure Monitor action groups | Azure Friday
Azure Monitor action groups enable you to define a list of actions to execute when an alert is triggered. In this episode, we demonstrate how to configure a ...
Microsoft Developer
Designing Secure Architectures the Modern Way, Regardless of Stack
Eugene Pilyankevich shares his experience of implementing sophisticated defenses in constrained environments - ranging from protecting power grid SCADA ...
InfoQ
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices
Continuous delivery (CD) enables teams to be more agile and quickens the pace of innovation. Too often, however, teams adopt CD without putting the right ...
Amazon Web Services
Asset Manager Explained | Inside Unreal
This week on Inside Unreal, Ben Zeigler will walk us through how to use the Asset Manager to efficiently categorize, load, and ship large amounts of data.
Unreal Engine
What's new in control groups (cgroups) version 2?
Michael Kerrisk https://2019.linux.conf.au/schedule/presentation/124/ Control groups (cgroups) version 1 was released in 2008, and within a short time people ...
linux.conf.au
Edward Witten: On the Shoulders of Giants
Acknowledging the scientists who blazed intellectual trails before him, Isaac Newton wrote, “If I have seen a little further it was by standing on the shoulders of ...
World Science Festival
Software Testing Tutorial For Beginners | Software Testing Automation Tutorial | DevOps |Simplilearn
This Software testing tutorial covers the basics of software testing and the automation tools used for software testing. We'll look at the test-driven development ...
Simplilearn
Network protection in Microsoft Defender ATP
Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access ...
Microsoft 365
SQL Server 2017 Always On Availability Groups – WINDOWS AND LINUX DEPLOYMENTS
Introduced in SQL Server 2012, Always On Availability Groups maximizes the readiness of a set of user databases as an availability group that can fail over as a ...
High Availability Disaster Recovery Virtual Group
Securing your data in SharePoint/OneDrive/Microsoft Teams with Sensitivity Labels
In this 45-minute administrator/developer focused tour of the latest security controls and sensitivity labeling capabilities available today or soon in SharePoint, ...
Microsoft 365 Community
Linux Server Build: OpenVPN From Scratch - Hak5 2019
apt-get update; apt-get install openvpn easy-rsa gunzip -c /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz /etc/openvpn/server.conf nano ...
Hak5
Introducing Multi-Geo capabilities in Office 365 and how to configure them
See the capabilities of Multi-Geo in Office 365 which allows you to determine, where your data resides within a single Office 365 tenant across multiple regions ...
Microsoft Mechanics
Advanced hunting in Microsoft Defender ATP
Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to ...
Microsoft 365
Dell EMC Unity Product Overview and Architecture with Kaushik Ghosh
Kaushik Ghosh, Senior Management, Product Development with Dell EMC Unity, gives a product overview of their line. This includes their all-flash arrays, ...
Tech Field Day
VMware NSX Edge Gateway & Distributed Firewall with Tim Davis @aldtd #vBrownBag
Tim Davis wraps up the mini NSX ninja series discussing Edge Gateways (ESG) and Distributed Firewall (DFW). Show Notes *About vBrownBag* - Edge ...
vBrownBag
Kubernetes Full Course | Kubernetes Architecture | Kubernetes Tutorial For Beginners | Simplilearn
In this full course video on Kubernetes, you have a brief introduction of Kubernetes and then learn how to install Kubernetes on Ubuntu. Then, we dive deep into ...
Simplilearn
Knowledge Management Tips to Improve Employee Experience in 2021
Lucidworks
Let's Encrypt UniFi
How to install a Let's Encrypt certificate on UniFi and configure crontab to automatically renew the certificate every 12 hours. 15 Minute Hosted UniFi Controller: ...
Crosstalk Solutions
The HL7 Terminology
This webinar introduces the HL7 terminology publication website and shows how to view and access this published terminology content that is referenced in ...
Health Level Seven
Untangle 101: Untangle at Home
Concerned about getting visibility into your home network? Disappointed with the functionality of your Wi-Fi router? Consider running Untangle with our ...
Untangle, Inc.
Security configuration in Microsoft Defender ATP
Microsoft Endpoint Manager is a central place to manage the configuration of organizations' devices. In this video, you'll learn how to use it to manage security ...
Microsoft 365
Coronavirus: LAUSD superintendent warns of consequences of diminished funding due to pandemic
Update: In his weekly briefing on May 18, LAUSD Superintendent Austin Beutner discussed how state budget cuts caused by the COVID-19 outbreak could ...
KTLA 5
How to Achieve PCI DSS Compliance on AWS
USM Anywhere from AlienVault provides a comprehensive threat detection and compliance solution for monitoring cloud and on-premises environments.
Amazon Web Services
Citrix Synergy TV - SYN229 - nFactor and Login Schemas...
Citrix Synergy TV - SYN229 - nFactor and Login Schemas: the future of NetScaler customization With earlier versions of NetScaler firmware, administrators ...
Citrix
How service providers can manage their customers in the Azure portal
In this video, learn how Managed Service Providers can easily manage their customer assets from within their environment. Once the customer is onboarded to ...
Microsoft Azure
Azure Information Protection Demo
Azure Information Protection (End User Adoption Guide), https://goo.gl/iqGH4h Install AADRM PowerShell Module, https://goo.gl/CRcAUN.
Atul Raizada
Conditional Access in Enterprise Mobility + Security
Microsoft engineer and identity expert Alex Simons, joins Simon May to demonstrate updates to Conditional Access, part of Microsoft's Enterprise Mobility + ...
Microsoft Mechanics
Early look at Microsoft Threat Protection
Microsoft Threat Protection harnesses trillions of threat signals from the Microsoft Intelligent Security Graph to secure your workplace using Microsoft Threat ...
Microsoft Mechanics
Oracle Database 18c New Security Features
Held on August 9 2018 In this AskTOM session Russ Lowenthal focuses on new security features in Oracle Database 18.3 - recently released for on-premises ...
Oracle Developers
Technical Monitoring with SAP Solution Manager 7.2
Reduce downtime and monitor your SAP applications from anywhere In this webinar workshop, we learn how SAP Solution Manager 7.2 helps minimize ...
CoreALM
Introducing privileged access management in Office 365
In this demonstration, we'll introduce the new Privileged Access Management capabilities in Office 365, that allows you to control admin privileges within your ...
Microsoft Mechanics
Microsoft Exchange 2016 – Architecture and Mail flow
Exchange Server 2016 uses a single building block architecture that provides email services for deployments at all sizes, from small organizations to the largest ...
ITProGuide
SYN328 - Federated Authentication Service, SAML with XenApp and XenDesktop
New in XenApp and XenDesktop 7.8, Federated Authentication Service enables authentication from worlds outside the username/password/smartcard set ...
Citrix
Hosted UniFi Controller Setup on Vultr
How to set up a hosted UniFi Controller on Vultr. Sign up for Vultr here: https://www.vultr.com/?ref=7803228-4F Blog post: ...
Crosstalk Solutions