Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
Cisco Systems Podcasts
Listen to Cisco experts discuss industry, business, and technology topics pertinent to the Unified Workspace. Learn how Cisco Unified Communications solutions and services can help organizations solve cost, productivity, and process issues.
…
continue reading
Listen in on discussions with Cisco and industry experts regarding business, design, and deployment considerations of SSL VPN in focused 10-15 minute topics. This will be a series of seven discussions, occurring once monthly.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Where Technology Meets the Real World
…
continue reading
Stories about technology, mobility, the cloud, social media, collaboration and cyber security. From Cisco headquarters in the Silicon Valley.
…
continue reading
This series of programs for education IT professionals covers unified communications topics and applications.
…
continue reading
Yuval Boger, Chief Commercial Officer at QuEra, hosts thought leaders in quantum computing, quantum sensing, and quantum communications to discuss business and technical aspects that impact the quantum ecosystem. Full transcripts are available at podcast.yboger.com
…
continue reading
Join Miles Fisher as he goes deep with living legends about the life secrets that made these visionaries go from good to GREAT.
…
continue reading
This podcast series is hosted by SIJ Technical Editor, Eric Bogatin and includes fireside chats with members from the Signal Integrity Journal community who are experts in their field and have a commitment to providing training and education in SI, PI, and EMC/EMI issues for other engineers. Podcast sponsored by: Rohde & Schwarz.
…
continue reading
Welcome to Ventev's podcast! Here you can listen to industry and subject matter experts share their knowledge and experiences around wireless network deployment, interoperability with leading network manufacturers, innovative solutions from Ventev, and much more. Hosted by master podcaster, Jonathan Davy, and industry expert, Jared VanAllen, in the United States, follow our podcast for the latest episodes twice a month!
…
continue reading
…
continue reading
Gamma Electronics presents DAS Talk, hosted by Peter Weyherter and Philip Nicholas aims to increase competency and awareness among integrators, AHJs, builders, and stakeholders involved in ERCES. We strive to inspire more organizations in this field through a blend of technical depth and accessible conversation, positioning our podcast as a go-to resource for professionals and individuals at the intersection of technology, safety, and communication
…
continue reading
Techzine Talks on Tour is a podcast series recorded on location at the events Coen and Sander attend all over the world. A spin-off of the successful Dutch series Techzine Talks, this new English series aims to reach new audiences. Each episode is an approximately 30-minute discussion that Coen or Sander has with a high-level executive of a technology company. The episodes are single-take affairs, and we don't (or hardly) edit them afterwards, apart from polishing the audio up a bit of cours ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
…
continue reading

1
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
…
continue reading

1
Malware Analysis Using Artificial Intelligence and Deep Learning
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading

1
TNO045: IP and Optical Integration: Automation Across Layers
1:02:17
1:02:17
Play later
Play later
Lists
Like
Liked
1:02:17LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. Th…
…
continue reading

1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading

1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading
By CyberSecurity Summary
…
continue reading
By CyberSecurity Summary
…
continue reading

1
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
…
continue reading

1
ITIL 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
…
continue reading

1
ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types.…
…
continue reading

1
TNO044: Inside a Global Enterprise Data Center Network Migration (Sponsored)
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »…
…
continue reading

1
Introduction to Python Network Automation: The First Journey
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48Provides a detailed guide for network engineers to transition into network automation. It commences with fundamental Python concepts, covering data types, syntax, and error handling through numerous exercises. The book then progresses to Linux administration essentials, emphasizing the creation and management of virtual environments using VMware Wo…
…
continue reading

1
Intelligent Reliability Analysis Using MATLAB and AI: Perform Failure Analysis and Reliability Engineering using MATLAB and Artificial Intel
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04Introduces intelligent reliability analysis using MATLAB and AI, focusing on failure analysis and reliability engineering. It covers foundational concepts like reliability fundamentals, measures of reliability such as MTBF and MTTF, and remaining useful lifetime (RUL) estimation techniques. The sources also explore experimental methodologies like a…
…
continue reading

1
Special Episode: Architecting Reliable Agentic AI I Cisco’s Giovanna Carofiglio on the AGNTCY Collective
42:06
42:06
Play later
Play later
Lists
Like
Liked
42:06By WRITER
…
continue reading

1
Implementing VMware Dynamic Environment Manager:: Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies
19:41
19:41
Play later
Play later
Lists
Like
Liked
19:41A comprehensive guide to VMware Dynamic Environment Manager (DEM), a solution for managing end-user desktop experiences. It details the installation and initial configuration of DEM, including setting up Group Policy Objects (GPOs) and understanding the NoAD mode. The text explores various aspects of desktop management, such as user personalization…
…
continue reading

1
OpenAI API Cookbook: Build intelligent applications including chatbots, virtual assistants, and content generators
18:31
18:31
Play later
Play later
Lists
Like
Liked
18:31A practical guide for building intelligent applications using the OpenAI API. The book provides step-by-step instructions on leveraging various OpenAI endpoints, including Chat Completions, Images, and Audio, to create diverse applications like chatbots, virtual assistants, and content generators. It explains how to interact with the API through to…
…
continue reading

1
NoOps: How AI Agents Are Reinventing DevOps and Software
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Explores the evolution of DevOps and its contemporary challenges, particularly the issue of fragmented toolchains and the necessity of standardization. It details how cloud-native and data-centric architectures, including microservices, containers, and Infrastructure as Code (IaC), establish a robust foundation for modern software delivery. A signi…
…
continue reading

1
Motorola x Gamma Roundtable | Doing BDAs Right, Uplink Commissioning, and Protecting Public Safety
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54Welcome to a special episode of DAS Talk, presented by DAS University and hosted by Peter (VP of Gamma Electronics). This time, we’re on-site at Motorola’s Fort Lauderdale headquarters for a powerful roundtable conversation with Rich Jimenez (Motorola Solutions) and Rick Rausch (Gamma Electronics). In this extended discussion, we dive into one of t…
…
continue reading

1
Inside Potter ERCES: Public Safety DAS Solutions & Summit Preview | DAS Talk with Adam Dutcher
21:02
21:02
Play later
Play later
Lists
Like
Liked
21:02Welcome back to DAS Talk, the industry podcast dedicated to Distributed Antenna Systems (DAS) and in-building public safety communication. Hosted by Gil Martinez of GAMMA, this episode features a deep-dive conversation with Adam Dutcher of Potter ERCES — a growing force in emergency communication systems. Potter ERCES has emerged as a key player by…
…
continue reading

1
Converged Wireless Networks and DAS Strategy: BEST & Mobili-Fi Talk Real-World RF Deployment
22:25
22:25
Play later
Play later
Lists
Like
Liked
22:25In this episode of DAS Talk, Gil from GAMMA steps in to host a powerful conversation with Adam Dunnom (BEST Enterprises) and Andy Major (Mobili-Fi) about real-world DAS implementation strategies, the future of converged wireless networks, and how to better align AHJs, integrators, and building owners. With the DAS University Live Summit coming up A…
…
continue reading

1
Survey. Design. Analyze. — iBwave and the Future of In-Building Public Safety Communication
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52On this episode of DAS Talk, Gil from GAMMA steps in as host while Peter is on the road and Philip Nicholas is deep in preparations for the upcoming DAS University Live Summit. Gil is joined by returning guest Robin Mitchell, Sales Engineering Manager at iBwave, for a timely and in-depth conversation on the critical role of proper surveying, design…
…
continue reading

1
Constanza Bustamante, research fellow at the Center for a New American Security (CNAS)
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Constanza Bustamante, a research fellow at the Center for a New American Security (CNAS) is interviewed by Yuval Boger to discuss quantum policy at the nexus of national and economic security. Constanza contrasts China’s state-led, scale-oriented model with the U.S.’s science-first, private-sector translation approach; traces bipartisan continuity …
…
continue reading

1
Mastering spaCy: Build structured NLP solutions with custom components and models powered by spacy-llm
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46A comprehensive guide for Natural Language Processing (NLP) professionals, focusing on advanced techniques and applications using the spaCy library. The text covers various topics, including linguistic feature extraction, rule-based matching, utilizing transformer models like BERT and RoBERTa within spaCy, and integrating Large Language Models (LLM…
…
continue reading

1
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12A comprehensive guide for network professionals transitioning from traditional Multiprotocol Label Switching (MPLS) to Segment Routing MPLS (SR-MPLS). It aims to simplify this complex shift through theoretical explanations and practical lab exercises, using network emulators like EVE-NG and virtual Cisco XRv9k routers. The text explores fundamental…
…
continue reading

1
Mastering C++ Game Animation Programming: Enhance your skills with advanced game animation techniques in C++, OpenGL
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
…
continue reading

1
Ruby Way, The: Solutions and Techniques in Ruby Programming (Addison-Wesley Professional Ruby Series)
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
…
continue reading

1
Workday CTO reveals AI agent strategy and billion-dollar acquisitions
30:33
30:33
Play later
Play later
Lists
Like
Liked
30:33Peter Bailis, the new CTO of Workday, discusses the company's ambitious AI agent strategy and recent major acquisitions including Sana, Paradox, and Flowise. He explains Workday's vision to become the "agent system of record" - extending their people and money management platform to govern AI agents across enterprises. Bailis reveals how Workday pl…
…
continue reading

1
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
21:18
21:18
Play later
Play later
Lists
Like
Liked
21:18A powerful technology for programming the Linux kernel to enhance observability, networking, and security. It explains eBPF's fundamentals, including its virtual machine, instruction set, maps, and helper functions, along with the verifier that ensures program safety. The text details how eBPF programs are written in C (and increasingly Rust), comp…
…
continue reading

1
Machine Learning for Tabular Data: XGBoost, Deep Learning, and AI
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09Focuses on machine learning for tabular data, covering its fundamental concepts and practical applications. The sources explore various machine learning and deep learning approaches, with a particular emphasis on gradient boosting techniques like XGBoost and LightGBM, highlighting their efficacy with structured data. Readers will learn about data p…
…
continue reading

1
TNO043: Under the Manhole Cover: The Architecture of an Internet Exchange
1:11:02
1:11:02
Play later
Play later
Lists
Like
Liked
1:11:02In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those things. So let’s get inside Mass IX, the Massachusetts Internet Exchange, to get a holistic view of the logical architecture and protocol mechanics of peering and Internet exchanges, as well as the iron, s…
…
continue reading

1
Learn Quantum Computing with Python and IBM Quantum: Write your own practical quantum programs with Python
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42A comprehensive guide for individuals seeking to understand and implement quantum programs using Python and the IBM Quantum platform. It explores fundamental quantum computing principles like superposition, entanglement, and interference, detailing how these concepts underpin the creation of quantum circuits. The text also provides practical instru…
…
continue reading

1
Learning LangChain: Building AI and LLM Applications with LangChain and LangGraph
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25A comprehensive guide for developers creating AI and Large Language Model (LLM) applications. The book covers fundamental concepts such as prompt engineering and retrieval-augmented generation (RAG), explaining how to integrate external data and manage conversational memory. It thoroughly explores various cognitive architectures like chains, router…
…
continue reading

1
Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies)
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36Explores the integration of Cloud Computing and the Internet of Things (IoT), highlighting their combined applications across diverse sectors. It details the fundamental concepts of both cloud computing and IoT, including their architectures, components, advantages, and disadvantages. The source also examines real-world applications such as smart c…
…
continue reading
A comprehensive guide for mastering shader programming within the Unity 5 game engine. Authored by Alan Zucconi and Kenneth Lammers, it explores various lighting models, rendering techniques, and visual effects, ranging from basic diffuse shading and texture mapping to advanced concepts like Physically Based Rendering (PBR) and screen effects. The …
…
continue reading

1
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05A practical resource for mastering cybersecurity assessments. The text covers Nmap's versatile applications in network security, including penetration testing, red teaming, and purple teaming, detailing fundamental and advanced scanning techniques. It emphasizes setting up a lab environment for hands-on practice, mapping attack surfaces, identifyin…
…
continue reading

1
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30Discuss Radio Frequency Identification (RFID) technology, exploring its evolution and applications across various industries, particularly supply chain management and retail. They examine the technical advancements in RFID, including printed electronics and silicon ink, highlighting their impact on cost reduction and performance. A significant port…
…
continue reading

1
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY (Bitcoins, Hacking, Kali Linux)
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12Provides an extensive overview of operational security (opsec) and anonymity in the digital and physical realms. It thoroughly explains the use of tools like Tor, Freenet, and various encryption methods (PGP, Truecrypt, Veracrypt) to protect digital footprints, communications, and data. The text also highlights the importance of physical security p…
…
continue reading

1
The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44Offers an in-depth look at security concerns surrounding Large Language Models (LLMs), drawing heavily from "The Developer’s Playbook for Large Language Model Security" by Steve Wilson. It presents endorsements highlighting the book's importance for AI developers and security professionals due to the novel risks LLMs introduce. The text outlines va…
…
continue reading

1
Speed Up Your Python with Rust: Optimize Python performance by creating Python pip modules in Rust with PyO3
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05A technical guide published by Packt Publishing in 2021. It focuses on optimizing Python application performance by integrating Rust code. The book provides practical guidance on creating Python pip modules with Rust, managing dependencies using Cargo, and structuring Rust code for efficient integration. It explores advanced topics like concurrency…
…
continue reading

1
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04A comprehensive overview of ransomware. It details the history and evolution of various malware types, with a specific focus on ransomware families like Ryuk, WannaCry, and Locky. The sources explore the methods of ransomware distribution, such as email phishing and exploit kits, and explain why traditional antivirus software struggles to detect th…
…
continue reading
A comprehensive overview of networking fundamentals. It covers essential network concepts, including devices, applications, protocols, and services, explaining their roles within the OSI model and discussing routing and switching characteristics. The text further explores IP addressing components, network topologies, and wireless technologies, alon…
…
continue reading

1
Microsoft Exam MD-100 Windows 10 Certification Guide: Learn the skills required to become a Microsoft Certified Modern Desktop Administrator
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59Provides comprehensive information on deploying, upgrading, customizing, and configuring the Windows 10 operating system. It covers essential topics such as managing local users, groups, and devices, configuring permissions and file access, implementing local policies, and securing data and applications. The text also explores network configuration…
…
continue reading

1
Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15A comprehensive guide to securing cloud-native applications and APIs, specifically focusing on OAuth and OpenID Connect standards. The book covers a wide range of topics, including API authorization, token design and management, secure client implementations for various application types (web, mobile, desktop), and the deployment and operational as…
…
continue reading

1
Azure OpenAI Essentials: A practical guide to unlocking generative AI-powered innovation with Azure OpenAI
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11A comprehensive guide to leveraging Azure OpenAI. It details the fundamentals of Large Language Models (LLMs), their various applications, and how to integrate them within the Microsoft Azure ecosystem. The book explores advanced topics such as multimodal capabilities, function calling, and Assistants API, along with crucial aspects of privacy, sec…
…
continue reading

1
TNO042: Building a Network Digital Twin for Automation and AI (Sponsored)
1:01:17
1:01:17
Play later
Play later
Lists
Like
Liked
1:01:17The digital twin is an evolving technology in the networking space. On today’s sponsored episode of Total Network Operations, we dig into details and definitions of the digital twin, how it ties into network automation and autonomy, and the power of abstraction layers. We’ll also talk about how the concepts in today’s show might influence... Read m…
…
continue reading

1
Cisco ThousandEyes: Digital Experience Monitoring and Troubleshooting (Networking Technology)
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25A comprehensive guide for IT professionals on utilizing the Cisco ThousandEyes platform. The book covers deploying and configuring various ThousandEyes agents like Enterprise, Cloud, and Endpoint agents, and details different test types for network, DNS, and web layers, including sophisticated Transaction tests. It also explores alerting mechanisms…
…
continue reading

1
CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 (Sybex Study Guide)
19:24
19:24
Play later
Play later
Lists
Like
Liked
19:24A comprehensive guide to CompTIA A+ certification, focusing on hardware, networking, operating systems, and security. It details various display technologies like LCD, IPS, and OLED, along with connectivity standards such as USB-C and Thunderbolt. The text also covers printer types, maintenance, and common troubleshooting steps for issues ranging f…
…
continue reading

1
Certified Kubernetes Administrator Study Companion : Preparing for the Linux Foundation's CKA Exam
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35A study companion for the Certified Kubernetes Administrator (CKA) exam, offering comprehensive guidance for professionals aiming to master Kubernetes. It covers fundamental concepts, architecture, and installation using tools like KinD and Kubeadm, progressing to advanced topics such as workloads, scheduling, storage, networking, and security. The…
…
continue reading

1
Exploring Azure Container Apps: Scaling Modern and Cloud-Native Apps and Microservices
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43A comprehensive guide for developers by Naga Santhosh Reddy Vootukuri, Taiseer Joudeh, and Wael Kdouh, with technical review by Tommaso Stocchi. It details the Azure Container Apps (ACA) platform, comparing it to other Azure services like App Services and Kubernetes Service (AKS), and covers deploying containerized applications. The text also expla…
…
continue reading