Cybersecurity | Cloud | DevelopmentAutomate your IX’s RS Config November 16, 2024 video 2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark
Cybersecurity | Cloud | DevelopmentHimanshu Rao on Reliability, Performance, and Scalability in the Cloud [TECHNOLOGYANDFRIENDS 732] March 19, 2023 video azureCloud ComputingperformancereliabilityscalabilitysoftwareTechnology
Cybersecurity | Cloud | DevelopmentBSI.Организация.Услуги. Преимущества. ISO 55001. Управление производственными активами. ТоиР. RCM March 18, 2021 video AppleBritish Standards Institution описание оборудованияBSICoca-Colacтруктура производстваISO 14001ISO 31000ISO 55000ISO 55001ISO 55001 Управление активамиiso 9001OHSAS 18001 ISO 27001rcmreliabilitySukhoi Superjet 100 (SSJ-100)АСУ ТОиРБашнефтьглавный инженеринженер по надежностиМТСПочта Россиипростоевнетрискисистема ТОиРтоируправление активамиуправление надежностьюуправление производственными активамиценность активов
Cybersecurity | Cloud | DevelopmentUsing Pod Security Policies to harden your Kubernetes cluster December 16, 2020 video 2019alertingArchitectureautomatebountybugcertificatecloudclusterdefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeykuberneteslogmaliciousmanagementmanagermonitoringmultinetworkOLAPOLTPOnionOpenopenscapOSINTpodpolarDBPolicyprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemtenantTortrafficusabilityUserVitessWireshark
Cybersecurity | Cloud | DevelopmentScale MySQL beyond limits with ProxySQL November 22, 2020 video 2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark