Best Practices for Storage Classes, Reliability, Performance, and Scalability (Cloud Next '19)
You have data and you serve applications, systems, or people who access it. Depending on what kind of data you have and what kind of workload you're ...
Google Cloud Platform
Build Modern Serverless Applications with GraphQL APIs and AWS AppSync - AWS Online Tech Talks
AWS AppSync lets you create robust, scalable GraphQL APIs to securely access and consolidate data from multiple sources. It makes it easy to build ...
AWS Online Tech Talks
Hyperspace: An Indexing Subsystem for Apache Spark
At Microsoft, we store datasets (both from internal teams and external customers) ranging from a few GBs to 100s of PBs in our data lake. The scope of analytics ...
Databricks
Introduction to jBPM | jBPM Components | jBPM Architecture | jBPM Tutorial | Intellipaat
This jBPM online video helps you to learn following topics: 00:43 - jbpm suite key components 05:25 - jbpm architecture 06:28 - jbpm.org 20:19 - jbpm quiz If ...
Intellipaat
A Planned Methodology for Forensically Sound IR in Office 365 - SANS DFIR Summit 2018
A planned methodology for developing and implementing a forensically sound incident response plan in Microsoft's Office 365 cloud environment must be ...
SANS Digital Forensics and Incident Response
Advanced Zeek Usage Scripting and Framework
The open-source Network Security Monitor (NSM) and analytics platform Zeek (formerly known as Bro) became well-known in the information security industry ...
SANS Digital Forensics and Incident Response
Next.js: The React Framework - JS Monthly - July 2019
Next.js: The React Framework // Tim Neutkens - Zeit 63% of npm users are using React. Making it the most popular JavaScript framework ever. React is being ...
Pusher
Windows Virtual Desktop updates for admins (2020)
See the admin-focused updates to Windows Virtual Desktop for the first half of 2020. Starting with the brand new Windows Virtual Desktop admin center, we'll ...
Microsoft Mechanics
How to set up a direct interconnection between Azure and Oracle Cloud Infrastructure | Azure Friday
Romit Girdhar (Microsoft) and Chinmay Joshi (Oracle) join Lara Rubbelke to explain how to interconnect Microsoft Azure and Oracle Cloud Infrastructure.
Microsoft Azure
Building Robust Production Data Pipelines with Databricks Delta
Most data practitioners grapple with data quality issues and data pipeline complexities—it's the bane of their existence. Data engineers, in particular, strive to ...
Databricks
Google Cloud Next '19: Day 2 Product Innovation Keynote
Urs Hölzle, SVP, Technical Infastructure, 1:19 Deepti Srivastava, Product Manager, Cloud Databases, 18:45 Justin Arbuckle, Scotiabank, SVP, 25:44 Julie Price, ...
Google Cloud Platform
Azure Monitor action groups | Azure Friday
Azure Monitor action groups enable you to define a list of actions to execute when an alert is triggered. In this episode, we demonstrate how to configure a ...
Microsoft Developer
Designing Secure Architectures the Modern Way, Regardless of Stack
Eugene Pilyankevich shares his experience of implementing sophisticated defenses in constrained environments - ranging from protecting power grid SCADA ...
InfoQ
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices
Continuous delivery (CD) enables teams to be more agile and quickens the pace of innovation. Too often, however, teams adopt CD without putting the right ...
Amazon Web Services
Asset Manager Explained | Inside Unreal
This week on Inside Unreal, Ben Zeigler will walk us through how to use the Asset Manager to efficiently categorize, load, and ship large amounts of data.
Unreal Engine
What's new in control groups (cgroups) version 2?
Michael Kerrisk https://2019.linux.conf.au/schedule/presentation/124/ Control groups (cgroups) version 1 was released in 2008, and within a short time people ...
linux.conf.au
Software Testing Tutorial For Beginners | Software Testing Automation Tutorial | DevOps |Simplilearn
This Software testing tutorial covers the basics of software testing and the automation tools used for software testing. We'll look at the test-driven development ...
Simplilearn
Edward Witten: On the Shoulders of Giants
Acknowledging the scientists who blazed intellectual trails before him, Isaac Newton wrote, “If I have seen a little further it was by standing on the shoulders of ...
World Science Festival
Network protection in Microsoft Defender ATP
Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access ...
Microsoft 365
The Definitive Guide to Hosted UniFi
The Definitive Guide to Hosted UniFi is a living document that details best practices for setting up and securing a hosted UniFi Controller. Full written instructions: ...
Crosstalk Solutions
SAML 2.0: Technical Overview
This video will explain the basics of the SAML protocol, focusing on what an IT administrator tasked with setting up federation must know. VMware End-User ...
VMware End-User Computing
Securing your data in SharePoint/OneDrive/Microsoft Teams with Sensitivity Labels
In this 45-minute administrator/developer focused tour of the latest security controls and sensitivity labeling capabilities available today or soon in SharePoint, ...
Microsoft 365 Community
Linux Server Build: OpenVPN From Scratch - Hak5 2019
apt-get update; apt-get install openvpn easy-rsa gunzip -c /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz /etc/openvpn/server.conf nano ...
Hak5
The HL7 Terminology
This webinar introduces the HL7 terminology publication website and shows how to view and access this published terminology content that is referenced in ...
Health Level Seven
Introducing Multi-Geo capabilities in Office 365 and how to configure them
See the capabilities of Multi-Geo in Office 365 which allows you to determine, where your data resides within a single Office 365 tenant across multiple regions ...
Microsoft Mechanics
Advanced hunting in Microsoft Defender ATP
Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to ...
Microsoft 365
Dell EMC Unity Product Overview and Architecture with Kaushik Ghosh
Kaushik Ghosh, Senior Management, Product Development with Dell EMC Unity, gives a product overview of their line. This includes their all-flash arrays, ...
Tech Field Day
The Past, Present, and Future of Cloud Automation - Webinar
CMP is dead, long live CMP! As many of you know Morpheus was designed as a self-service engine for hybrid cloud application orchestration but along the way ...
Morpheus Data
Knowledge Management Tips to Improve Employee Experience in 2021
Lucidworks
Kubernetes Full Course | Kubernetes Architecture | Kubernetes Tutorial For Beginners | Simplilearn
In this full course video on Kubernetes, you have a brief introduction of Kubernetes and then learn how to install Kubernetes on Ubuntu. Then, we dive deep into ...
Simplilearn
Let's Encrypt UniFi
How to install a Let's Encrypt certificate on UniFi and configure crontab to automatically renew the certificate every 12 hours. 15 Minute Hosted UniFi Controller: ...
Crosstalk Solutions
Untangle 101: Untangle at Home
Concerned about getting visibility into your home network? Disappointed with the functionality of your Wi-Fi router? Consider running Untangle with our ...
Untangle, Inc.
Security configuration in Microsoft Defender ATP
Microsoft Endpoint Manager is a central place to manage the configuration of organizations' devices. In this video, you'll learn how to use it to manage security ...
Microsoft 365
Coronavirus: LAUSD superintendent warns of consequences of diminished funding due to pandemic
Update: In his weekly briefing on May 18, LAUSD Superintendent Austin Beutner discussed how state budget cuts caused by the COVID-19 outbreak could ...
KTLA 5
How to Achieve PCI DSS Compliance on AWS
USM Anywhere from AlienVault provides a comprehensive threat detection and compliance solution for monitoring cloud and on-premises environments.
Amazon Web Services
Citrix Synergy TV - SYN229 - nFactor and Login Schemas...
Citrix Synergy TV - SYN229 - nFactor and Login Schemas: the future of NetScaler customization With earlier versions of NetScaler firmware, administrators ...
Citrix
How service providers can manage their customers in the Azure portal
In this video, learn how Managed Service Providers can easily manage their customer assets from within their environment. Once the customer is onboarded to ...
Microsoft Azure
OctopusPro Demo - Contractor Field Service Management Software
OctopusPro Field Service Management (FSM) software enables businesses to manage all aspects of their field service and site based operations. This demo ...
OctopusPro
Azure Information Protection Demo
Azure Information Protection (End User Adoption Guide), https://goo.gl/iqGH4h Install AADRM PowerShell Module, https://goo.gl/CRcAUN.
Atul Raizada
Conditional Access in Enterprise Mobility + Security
Microsoft engineer and identity expert Alex Simons, joins Simon May to demonstrate updates to Conditional Access, part of Microsoft's Enterprise Mobility + ...
Microsoft Mechanics
Oracle Database 18c New Security Features
Held on August 9 2018 In this AskTOM session Russ Lowenthal focuses on new security features in Oracle Database 18.3 - recently released for on-premises ...
Oracle Developers
Early look at Microsoft Threat Protection
Microsoft Threat Protection harnesses trillions of threat signals from the Microsoft Intelligent Security Graph to secure your workplace using Microsoft Threat ...
Microsoft Mechanics