Cybersecurity | Cloud | DevelopmentCfgMgmtCamp Hila Fish — Terraform Practices to Enable Infrastructure Scaling February 24, 2024 video best practicescfgmgmtcampcfgmgmtcamp23Configuration Managementhila fishinfrastructureTerraform
Cybersecurity | Cloud | DevelopmentDevOps & SysAdmins: What are the best practices for service accounts? December 20, 2023 video Active Directoryanswerbest practicesComputerdeveloperDevopsit professionaloperationsquestionSysAdminSystem AdministratorWindows Server 2003
Cybersecurity | Cloud | DevelopmentDevOps & SysAdmins: AD Best Practice for the connection specific DNS suffix network setting November 3, 2023 video Active Directorybest practicesComputerdeveloperDevopsit professionalnetworkingoperationsquestionSolutionSysAdminSystem Administrator
Cybersecurity | Cloud | DevelopmentDevOps & SysAdmins: Current Best Practice for using AD to auth Linux (2013) July 19, 2023 video Active DirectoryAuthenticationbest practicesComputerdeveloperDevopsit professionalLinuxoperationsproblemSolutionsSysAdminSystem Administrator
Cybersecurity | Cloud | DevelopmentIs it good practice to set HTTP headers in the load balancer? (3 Solutions!!) July 18, 2023 video Architecturebest practiceshttp headersNGINXproblemSolutions
Cybersecurity | Cloud | DevelopmentMicrosoft 365 – Combining O365, Security, Collaboration, and More June 8, 2023 video azurebest practicesBusiness SolutionsCornerstone.ITILTALaw FirmsLegal IndustryM365Managed ServicesmicrosoftModern WorkplaceO365SecurityTeamsWebinar
Cybersecurity | Cloud | DevelopmentGPO best practices : Security-Group Filtering Versus OU (2 Solutions!!) June 3, 2023 video Active Directorybest practicesgroup policyproblemSolution
Cybersecurity | Cloud | DevelopmentDevOps & SysAdmins: Active Directory Domain Controller in Multiple Sites – Server 2012 May 10, 2023 video Active Directorybest practicesComputerdeveloperDevopsit professionaloperationsproblemSolutionSolutionsSysAdminSystem Administratorwindows server 2012
Cybersecurity | Cloud | DevelopmentSecuring Vaadin apps with Spring Security and Keycloak (best practices) March 6, 2023 video Authorizationbest practicescsrfhttpInjectionKeyCloakOIDCSingle sign onspringSpring SecuritySSOtutorialuser based authorizationVaadinxss
Cybersecurity | Cloud | DevelopmentIndustrial Machine Learning Pipelines with Python & Airflow | PyConHK 2018 February 13, 2023 video Airflowbest practicesData EngineeringData PipelinesDataOpsDevopsIndustry-readymachine learningML PipelinesPyConPyConHKPyConHK2018pythonScalable