Talks

Sort by
Newest
Trending
1-30 of 152
Filter

ICS Pentesting During COVID - SANS ICS Security Summit 2021

05/04/2021
Views 166
0
authentication, client (computing), communication, computer network, confidentiality, cyber security, email, feeling, ics, ics certification, industrial control systems, industrial security, inventory, multi-factor authentication, nerc, nerc certification, nerc cip, organization, password, penetration test, pentesting, phishing, reason, regulatory compliance, remote penetration test, risk, safety, sans ics, sans institute, sansics, scada, server (computing), simulation, siri, software testing, telecommunication, understanding, virtual private network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How to Effectively Test Your Chatbot | Rasa Summit

02/12/2021
Views 361
0
automation, controlled-access highway, dog, elephant, english language, excelsior springs, missouri, fee, feedback, influenza, information, language, map, martin sheen, money, permutation, reason, regression analysis, roof rack, server (computing), tattoo, the right stuff (film), united kingdom, virtual private network, vitamin, vitamin b12
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

[Arm DevSummit - Session] Environmental System Monitoring With Grafana, Prometheus, and Tailscale

10/06/2020
Views 111
0
android (operating system), arm architecture, central processing unit, communication protocol, computer, computer hardware, computer network, control plane, data center, disk storage, firewall (computing), grafana, home automation, intelligent platform management interface, internet, ios, kernel (operating system), kubernetes, linux, load (computing), microsoft windows, server (computing), virtual private network, windows 10, wireless sensor network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

[Arm DevSummit - Session] Leveraging the Arm Ecosystem for Edge Processing

10/08/2020
Views 10
0
64-bit computing, arm architecture, booting, computer network, facial recognition system, firewall (computing), hauppauge computer works, instruction set architecture, internet, internet protocol, ipsec, ipv4, ipv6, linux, linux distribution, multiprotocol label switching, network function virtualization, private network, router (computing), sd-wan, unified extensible firmware interface, virtual private network, wide area network, x86
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

The Good, Bad, and Ugly of Migrating SQL Server to Public Clouds - Allan Hirt

11/13/2020
Views 46
0
active directory, backup, citrix systems, code, computer file, computer network, database, domain name, domain name system, dynamic host configuration protocol, hyper-v, ip address, ipv4, microsoft, microsoft azure, microsoft sql server, platform as a service, remote desktop services, software-defined networking, sql, virtual machine, virtual private network, virtualization, vmware, web application, world wide web, xeon
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Blockchain Solutions for a more Secure, Private and Fairer Internet on BlockDown 4.0 Day 1

04/16/2021
Views 210
0
amazon (company), android (operating system), apple inc., blockchain, computer hardware, computer network, digital distribution, e-commerce, ethereum, innovation, internet, ios, linux, mastercard, microsoft windows, operating system, peer-to-peer, plug and play, server (computing), sharing economy, usb, usb flash drive, virtual private network, visa inc., wi-fi
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Building decentralized solutions for digital privacy

02/29/2020
Views 33
0
annuity, blockchain, blockchain news 2020, blockhaine hackathon, brand, censorship, cloud computing, computer security, crypto events 2020, cryptocarrency 2020, cryptocurrency 2020, cryptocurrency solutions, decentralized solutions, digital privacy, dr. steven seven, eth 2020, eth development, ethereum, ethereum 2020 , ethereum development 2020, ethereum event, ethereum news 2020, ethlondonuk , ethlondonuk 2020, facebook, fintech, fintech conference 2020, google, great firewall, hacker, http cookie, instagram, internet, internet privacy, mosaic (web browser), security hacker, social media, steven waterhouse, surveillance, tinder (app), twitter, virtual private network, whatsapp, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Hands-On Workshop w/ Demo Teaching You How To Run A Validator on Polkadot | Trust-Less 2020

02/03/2020
Views 1.34 K
0
algorithm, backup, blockchain, cloud computing, computer science, consensus (computer science), crypto, database, denial-of-service attack, distributed computing, docker (software), firewall (computing), gossip, hash function, internet, interpreter (computing), linux, reddit, san francisco 49ers, science, selection algorithm, social experiment, social media, staking, telemetry, twitter, virtual private network, you are here (2010 film)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

IDEO on Doubling Down: Offering Additional Services with Validation - Panel | Trust-Less 2020

02/02/2020
Views 14
0
application software, blockchain, cloud computing, coinbase, computer network, credit, credit card, database, decentralization, ethereum, fee, inflation, internet, load balancing (computing), market (economics), mentorship, postgresql, privacy, reliability (computer networking), representational state transfer, sunk cost, throughput, virtual private network, wi-fi, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security for Validators, Deep-Dive Session - Hendrik Hofstadt | Trust-Less 2020

02/01/2020
Views 53
0
best practice, blockchain, book, cloud computing, computer security, contract, crypto, cryptographic hash function, cryptography, data center, database, denial-of-service attack, economy, internet, kubernetes, open-source software, proprietary software, reliability engineering, risk, service-level agreement, smart contract, software, staking, time, trusted computing, usb flash drive, virtual private network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Kumar Sreekanti & Robert Christiansen, HPE

06/23/2020
Views 486
0
application software, attention, automation, cloud computing, computer, computer science, computer vision, computing, computing services, coronavirus disease 2019, creativity, data center, database, devops, digital transformation, edge-computing hardware, hewlett packard enterprise, hewlett-packard, innovation, internet protocol suite, kubernetes, operating model, plex systems, reason, software, software-as-a-service, telecommunications, telecommuting, virtual private network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Herman Brown, City of San Francisco & Tarkan Maner, Nutanix

06/23/2020
Views 665
0
application software, bit, chief information officer, cloud computing, computer, computer performance, criminal record, dell, desktop virtualization, digital transformation, digitalization, employment, end user, finance, hewlett packard enterprise, hewlett-packard, hpe discover, laptop, law, law firm, lawyer, paralegal, police, remote work, team, virtual private network, web browser
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Build, deploy, modernize and manage apps using Anthos

07/14/2020
Views 731
0
amazon (company), amazon web services, best practice, bus, cloud computing, computer network, control plane, domain name, google, google chrome, ip address, kubernetes, load balancing (computing), login, namespace, node (networking), open-source software, personal computer, proxy server, serverless computing, software release life cycle, type: conference talk (full production);, version control, virtual private network, vmware, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

A better, safer normal

07/14/2020
Views 7.36 K
0
anthos, api management, apis, application modernization, arpanet, big data, bigquery, central processing unit, cloud ai, cloud computing, cloud migration, cloud next 2020, cloud run, compute engine, computing, cost management, covid, covid-19, cyberwarfare, data analytics, data center, data management, data science, data security, dei, devops, digital transformation, email, encryption, enterprise data, field-programmable gate array, g suite, gcp, google, google cloud, google cloud next, graphics processing unit, infrastructure, internet bot, internet protocol suite, interoperability, jess leroy, kubernetes , machine learning, malware, memory controller, multitenancy, next onair, onair apac, operation management, palo alto networks, parallel computing, phishing, privacy, remote workforce, spamming, sre, sunil potti, usability, virtual private network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Tom Gillis, VMware and Punit Minocha, Zscaler | VMworld 2020

09/29/2020
Views 275
0
#thecube, @thecube, application software, business model, cable television, central processing unit, cloud computing, cloud computing security, computer appliance, computer network, data center, dave vellante, department of motor vehicles, end user, firewall (computing), future, internet, jeff frick, john furrier, mind, multiprotocol label switching, netflix, proxy server, punit minocha, retail, set-top box, siliconangle, siliconangle inc, siliconangle media inc, telecommuting, thecube, tom gillis, virtual private network, virtualization, vmware, vmworld, vmworld 2020, wikibon, xbox live, zscaler
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Sanjay Uppal and Craig Connors, VMware | VMworld 2020

09/29/2020
Views 169
0
amazon (company), application software, client (computing), cloud computing, content-control software, craig connors, data center, dave vellante, edge computing, elon musk, end user, firewall (computing), gateway (telecommunications), internet, john furrier, kubernetes, microsoft azure, mobile app, privacy, quality of experience, sanjay uppal, secure access service edge, siliconangle, siliconangle inc, siliconangle media inc, telecommuting, telehealth, thecube, university of texas md anderson cancer center, virtual private network, vmware, vmworld, vmworld 2020, web browser, wikibon, workspace
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Designing Secure Architectures the Modern Way, Regardless of Stack

03/04/2020
Views 5.08 K
0
access control, active directory, computer security, coping, electric power transmission, electrical grid, electricity, encryption, identity management, infoq, microsoft, microsoft windows, modem, password, qcon, qcon london, regulatory compliance, replay attack, risk, risk aversion, risk management, science, security, software architecture, software framework, text messaging, time, transcripts, usability, virtual private network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Summit Virtual Event Coverage | AWS Summit Online 2020

05/13/2020
Views 392
0
amazon (company), amazon elastic compute cloud, amazon web services, artificial intelligence, cambrian explosion, citrix systems, cloud computing, community, data center, dave vellante, desktop virtualization, ecosystem, google, john furrier, language, mass media, microsoft, microsoft azure, oracle corporation, server (computing), siliconangle, siliconangle inc, siliconangle media inc, specification (technical standard), thecube, throughput, use case, virtual private network, virtualization, vmware, wikibon, zoom (software)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Sanjay Poonen, VMware | AWS Summit Online 2020

05/13/2020
Views 603
0
amazon (company), amazon web services, augmented reality, aws summit digital 2020, brand, carbon black (company), charles de gaulle, cloud computing, consumerization of information technology, dave vellante, ecological resilience, franklin d. roosevelt, google, ibm, immersion (virtual reality), john furrier, kubernetes, leadership, music, red hat, sanjay poonen, secret superstar, security, siliconangle, siliconangle inc, siliconangle media inc, thecube, videotelephony, virtual private network, virtual reality, vmware, wikibon, youtube, zoom (software)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Matt Garman, AWS | AWS Summit Online 2020

05/13/2020
Views 1.93 K
0
algorithm, amazon (company), amazon elastic compute cloud, amazon web services, analytics, aws, aws summit online 2020, cloud computing, database, dave vellante, google, innovation, internet, john furrier, machine learning, matt garman, microsoft, mind, mobile app, netflix, oracle corporation, privacy, queue area, siliconangle, siliconangle inc, siliconangle media inc, streaming media, supply chain, telehealth, thecube, unemployment, virtual private network, virtual world, web search engine, wikibon
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

AWS Networking Fundamentals - Level 200 (United States)

05/13/2020
Views 6.72 K
0
2020, amazon, amazon dynamodb, amazon elastic compute cloud, amazon vpc, amazon web services, aws, aws direct connect, aws events, aws summit online, border gateway protocol, cloud computing, compute & networking, computer network, database, gateway (telecommunications), internet, internet protocol, ip address, ipsec, ipv4, ipv6, ipv6 address, level 200, link aggregation, load balancing (computing), may 13, private network, router (computing), routing, subnetwork, transmission control protocol, united states, virtual private cloud, virtual private network, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Move Your Desktops and Applications to AWS End-User Computing - Level 200 (United States)

05/13/2020
Views 94
0
2020, amazon web services, amazon workspaces, at scale, aws, aws events, aws summit online, building applications, business, chromebook, cloud computing, computer network, desktop computer, desktop virtualization, end user, file hosting service, group policy, internet, level 200, linux, may 13, mobile app, netapp, operating system, password, personal computer, provisioning (telecommunications), scalability, server (computing), services, software, telecommuting, transform, united states, user (computing), virtual private network, windows 10, workspace
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Advanced VPC Connectivity Patterns - Level 400 (United States)

05/13/2020
Views 1.11 K
0
2020, amazon, amazon vpc, amazon web services, apple inc., asynchronous transfer mode, aws, aws direct connect, aws events, aws summit online, aws transit gateway, border gateway protocol, cable television, computer network, data center, domain name system, internet, internet access, internet protocol, ip address, latency (engineering), level 400, load balancing (computing), may 13, multiprotocol label switching, name server, network address translation, network load balancing, network packet, reason, recycling, router (computing), routing, track: compute & networking, track: operate, united states, virtual lan, virtual private cloud, virtual private network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Erez Yarkoni, Check Point Software Technologies | AWS re:Invent 2020

11/30/2020
Views 115
0
5g, algorithm, application security, artificial intelligence, authentication, automation, bottleneck (production), business agility, cloud computing, cloud computing security, computer network, data center, dave vellante, firewall (computing), food delivery, gateway (telecommunications), intelligence, internet of things, john furrier, learning, machine learning, siliconangle, siliconangle inc, siliconangle media inc, telecommuting, thecube, time, virtual private network, web application, wikibon, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Russ Currie, NetScout Systems | AWS re:Invent 2020

11/30/2020
Views 85
0
amazon (company), amazon web services, api, application software, automation, cloud computing, dave vellante, denial-of-service attack, desktop environment, economics, email spam, extortion, eye, innovation, intel, john furrier, landscape, network monitoring, ransomware, siliconangle, siliconangle inc, siliconangle media inc, software framework, technology, telecommuting, thecube, virtual private network, vmware, wikibon
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How to Beat Surveillance Capitalism and Reclaim Your Privacy | Ethereal Virtual Summit 2020

05/07/2020
Views 368
0
authoritarianism, biometrics, cambridge analytica, censorship, cloud computing, computer network, coronavirus disease 2019, cryptocurrency, democracy, facebook, filter bubble, great firewall, internet, internet access, ios, net neutrality, onion routing, patriot act, privacy, routing, state of emergency, surveillance, surveillance capitalism, virtual private network, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Virtually Private Networks

08/06/2020
Views 1.06 K
0
captive portal, computer network, dhcpv6, domain name system, dynamic host configuration protocol, end user, hypertext transfer protocol, internet, ip address, ipv6, javascript, mobile browser, name server, node (networking), operating system, private network, router (computing), split tunneling, subnetwork, transport layer security, tunneling protocol, virtual private network, web browser, wi-fi, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Remote Timing Attacks on TPMs, AKA TPM-Fail

08/06/2020
Views 693
0
central processing unit, common criteria, computer network, computing, cryptanalysis, cryptography, digital signature, elliptic curve digital signature algorithm, instruction set architecture, interface (computing), international association for cryptologic research, internet, library (computing), meltdown (security vulnerability), motherboard, openssl, public-key cryptography, rsa (cryptosystem), security token, software, spectre (security vulnerability), trusted computing, trusted platform module, virtual private network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

My Cloud is APT's Cloud: Investigating and Defending Office 365

08/06/2020
Views 1.16 K
0
active directory, api, database, dmz (computing), hypertext transfer protocol, information security, login, malware, microsoft exchange server, microsoft onedrive, microsoft onenote, microsoft word, multi-factor authentication, office 365, password, penetration test, proxy server, representational state transfer, salesforce, security token, sharepoint, simple mail transfer protocol, skype, virtual private network, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

5G Is No Exception: Cellular Is Still Insecure

12/11/2020
Views 5
0
3g, 5g, apple inc., bluetooth, cloud computing, communication protocol, disability, internet, internet access, internet of things, internet privacy, internet protocol, internet protocol suite, iphone, privacy, security alarm, signalling system no. 7, sms, virtual private network, voice over ip, voice over lte, wi-fi, wireless, wireless network, zoom (software)
Available
In cart
1 877 ₽
1 877 ₽
$25
$25
€ 22
€ 22
A$35
A$35
1 2 3 4 5 6