/** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */

Tag Based Security Demo

Using a Tag Based Strategy to Architect AWS Data Protection

Using a Tag Based Strategy to Architect AWS Data Protection

26:43
Permission Management at Scale with QuickSight Groups and Row-Level Security

Permission Management at Scale with QuickSight Groups and Row-Level Security

4:46
HDP-2.6.3 HDFS Transparent Encryption Using Ranger KMS

HDP-2.6.3 HDFS Transparent Encryption Using Ranger KMS

13:12
Controlling HDFS permission using Ranger

Controlling HDFS permission using Ranger

8:55
DataWorks Summit 2018 - Apache Atlas

DataWorks Summit 2018 - Apache Atlas

8:17
Beers With Engineers - Episode 12 - Enhancing Tag-Based Service Maps

Beers With Engineers - Episode 12 - Enhancing Tag-Based Service Maps

55:23
ITOM: Extending Discovery/Service Mapping Patterns | ServiceNow Tutorials

ITOM: Extending Discovery/Service Mapping Patterns | ServiceNow Tutorials

8:04
Combine Filters with Controls in Amazon Quicksight

Combine Filters with Controls in Amazon Quicksight

5:37
Anti theft system used in stores. RFID plastic tags on clothes.

Anti theft system used in stores. RFID plastic tags on clothes.

2:52
Role Based Access Control

Role Based Access Control

4:50

Recent searches