Cybersecurity | Cloud | DevelopmentTesting for and deploying to AWS environments: a toolbox (NixCon 2019) July 5, 2021 video Configuration ManagementDeclarativefunctionalNixNixOSpackage management
Cybersecurity | Cloud | DevelopmentHey Amazon Cloud (AWS), Meet Oxide.Computer May 28, 2021 video AmazonArchitectureAWScentralizedclouddecentralizedfunctionalitlambdaoxide.computertwitch
Cybersecurity | Cloud | DevelopmentUsing Pod Security Policies to harden your Kubernetes cluster December 16, 2020 video 2019alertingArchitectureautomatebountybugcertificatecloudclusterdefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeykuberneteslogmaliciousmanagementmanagermonitoringmultinetworkOLAPOLTPOnionOpenopenscapOSINTpodpolarDBPolicyprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemtenantTortrafficusabilityUserVitessWireshark
Cybersecurity | Cloud | DevelopmentOAuth 2.0 : What is OAuth 2.0 really all about || In Telugu(2020) December 5, 2020 video AuthenticationAuthorizationbrainbytesbrainsChinacoronacoursecovidfunctionalhyderabadIndiaJavajava brainsjavaoneJAX-RSJWTlearn javaOAuthOAuth 2.0oauth 2.0 and openid connectoauth 2.0 grant typesoauth 2.0 in mule 4oauth 2.0 tutorialoauth 2.0 tutorial in teluguoauth 2.0 tutorial phpoauth teluguoauth tutorialoauth tutorial 2.0 in hindiprogrammingRESTtamiltelugu lotrainingtutorialus
Cybersecurity | Cloud | DevelopmentScale MySQL beyond limits with ProxySQL November 22, 2020 video 2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark