Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Data Integrity
Showing:
133
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Stanford University
Common Pitfalls of A/B Testing and How to Avoid Them
0
rewiews
Explore common A/B testing pitfalls and learn strategies to analyze results, balance speed with significance, and maintain data integrity in simultaneous experiments.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
MLOps World: Machine Learning in Production
Build High Performance MLOps With ML Monitoring and AI Explainability
0
rewiews
Discover techniques for enhancing MLOps through ML monitoring and AI explainability. Learn to identify model failures, address operational issues, and streamline model deployment using advanced analytics.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Cloud Security Alliance
Integrating GenAI into Cloud Security Solutions
0
rewiews
Explore strategies for securely integrating GenAI into cloud security, addressing data challenges and operational safety while gaining actionable insights for effective implementation.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
MLOps World: Machine Learning in Production
Build High Performance MLOps With ML Monitoring and AI Explainability
0
rewiews
Discover techniques for enhancing MLOps through ML monitoring and AI explainability. Learn to identify model failures, address operational issues, and streamline model deployment using advanced analytics.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Caleb Curry
Database Design
0
rewiews
Comprehensive exploration of database design concepts, from basics to advanced topics, covering relationships, keys, normalization, and SQL joins for a deeper understanding of database architecture.
Add to list
52
Lesons
17 hours
On-Demand
Free-Video
Microsoft
Lesser Known Features of PostgreSQL
0
rewiews
Discover lesser-known PostgreSQL features for efficient data manipulation, testing, and querying. Learn practical tips to enhance your database skills and streamline development workflows.
Add to list
11
Lesons
30 minutes
On-Demand
Free-Video
Microsoft
Design a Data Partitioning Strategy
0
rewiews
Explore advanced data partitioning strategies for Azure Cosmos DB, including denormalization, referential integrity, and entity combination to optimize performance and scaling.
Add to list
10
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Mineralogical Society of America
Mineral Misidentification in Connection to Potential Hazards of Mineral Dusts
0
rewiews
Explore the challenges and implications of mineral dust misidentification, focusing on asbestos and its impact on human health and safety protocols.
Add to list
11
Lesons
30 minutes
On-Demand
Free-Video
CodeWithHarry
Inline Functions, Default Arguments and Constant Arguments in C++ - Tutorial 17
0
rewiews
Explore inline functions, default arguments, and constant arguments in C++. Learn to optimize code performance and enhance function flexibility for more efficient programming.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
The Center for Medical Education
Data Driven ED Solutions - Innovations in ED Management Course
0
rewiews
Explore innovative strategies for optimizing emergency department operations, focusing on data-driven solutions, patient flow management, and leadership techniques to enhance overall efficiency and care quality.
Add to list
18
Lesons
28 minutes
On-Demand
Free-Video
IEEE
Privacy and Access Control for Outsourced Personal Records
0
rewiews
Cryptographic system GORAM protects outsourced data secrecy, integrity, and access control while ensuring anonymity and unlinkability, addressing cloud storage security concerns for sensitive applications.
Add to list
5
Lesons
18 minutes
On-Demand
Free-Video
IEEE
Trustworthy Data Analytics in the Cloud Using SGX
0
rewiews
Explore trustworthy cloud-based data analytics using SGX technology. Learn about VC3, a system enabling secure MapReduce computations while preserving confidentiality and integrity of code and data.
Add to list
10
Lesons
22 minutes
On-Demand
Free-Video
Ben Eater
Hardware Build: CRC Calculation
0
rewiews
Hands-on tutorial demonstrating how to build hardware for computing and verifying cyclic redundancy checks (CRCs), simplifying complex mathematical concepts through practical implementation.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Privacy, Trust and the Future of Cybersecurity
0
rewiews
Explore privacy, trust, and future tech challenges with cryptography expert Bruce Schneier. Delve into encryption, IoT risks, data breaches, and policy implications in our increasingly connected world.
Add to list
48
Lesons
1 hour 15 minutes
On-Demand
Free-Video
TheIACR
Preventing Pollution Attacks in Multi-Source Network Coding
0
rewiews
Explore strategies to safeguard multi-source network coding systems against pollution attacks, enhancing data integrity and network security.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
OWASP Foundation
Medical Device Security: An Infectious Disease - Risks and Vulnerabilities
0
rewiews
Explore vulnerabilities in medical devices and healthcare systems, examining potential risks to patient safety and discussing strategies for improving security in the healthcare landscape.
Add to list
31
Lesons
58 minutes
On-Demand
Free-Video
Linux Foundation
Privacy-preserving Approaches to Transparency Logs
0
rewiews
Explore append-only transparency logs, their applications in infrastructure, and privacy-preserving techniques to balance immutability with user rights and data protection.
Add to list
21
Lesons
39 minutes
On-Demand
Free-Video
Linux Foundation
A Vulnerability Database Should Not Be About Vulnerabilities
0
rewiews
Explore innovative approaches to vulnerability databases, focusing on package-centric models, data aggregation, and addressing common issues in cybersecurity information management.
Add to list
17
Lesons
32 minutes
On-Demand
Free-Video
Cooper
Meet Operational Challenges with MISP on an Air-Gapped Network
0
rewiews
Explore strategies for implementing MISP on air-gapped networks to address operational challenges in secure environments.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Cooper
Exploiting and Attacking Seismological Networks Remotely
0
rewiews
Exploiting vulnerabilities in seismological networks to gain remote control and manipulate critical research data. Step-by-step demonstration of attack scenarios and recommendations for securing these systems.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Forensic 365
SANAN: Development of Lightweight Live Acquisition Tool for Amphibious Incident Response - Paper 7
0
rewiews
Explore SANAN, a lightweight live acquisition tool for digital forensics, designed to efficiently capture volatile data during incident response in our increasingly digital world.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Network Security - HMAC Algorithm
0
rewiews
Learn about the HMAC algorithm, its importance in network security, and how it ensures message integrity and authentication through cryptographic hash functions.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TEDx
Breaking Taboos - Perimenopause and Digital Diagnosis
0
rewiews
Exploring AI's potential in diagnosing perimenopause, balancing technological advancements with patient privacy and doctor-patient relationships in primary care.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
IBM
What is DNSSEC - Domain Name System Security Extensions
0
rewiews
Discover how DNSSEC protects against DNS hijacking, ensures online data integrity, and enhances website security. Learn implementation steps for robust protection.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
Databricks
Integrating MosaicML and Data Security in Advanced Machine Learning
0
rewiews
Explore strategies for integrating MosaicML with robust data security measures in machine learning, addressing privacy concerns in sectors like finance and healthcare while leveraging Generative AI potential.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
DevSecCon
Application-Layer Guarantees for Data Authenticity, Integrity, and Privacy
0
rewiews
Explore end-to-end data security in modern distributed applications. Learn to implement authenticity, integrity, and privacy guarantees across complex multi-hop routes and untrusted environments.
Add to list
1
Lesons
1 hour 20 minutes
On-Demand
Free-Video
SNIAVideo
DNAe2c Error Correction Code for DNA Data Storage - 10x Improvement Over Reed Solomon Codes
0
rewiews
Discover advanced error correction techniques for DNA data storage through DNAe2c, achieving 10x better performance than Reed Solomon codes with minimal overhead for improved data integrity and storage efficiency.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Databricks
Delta from a Data Engineer's Perspective - Creating Robust Big Data Solutions
0
rewiews
Explore a data engineer's challenges in creating robust Big Data solutions, covering Delta, Spark streaming, schema enforcement, and time travel functionality in data processing.
Add to list
21
Lesons
41 minutes
On-Demand
Free-Video
Linux Foundation
Building an Open Source Streaming Analytics Stack with Kafka and Druid
0
rewiews
Learn to build a robust streaming analytics stack using Kafka and Druid for real-time data processing, flexible querying, and maintaining data integrity in high-volume environments.
Add to list
24
Lesons
41 minutes
On-Demand
Free-Video
Data Science Conference
AI and Blockchain - Shaping the Future Through Synergistic Technologies
0
rewiews
Explore how AI and blockchain technologies converge to create powerful synergies, examining their complementary strengths in data integrity, security, and decision-making capabilities.
Add to list
9
Lesons
22 minutes
On-Demand
Free-Video
Kyoto-U OCW - Unofficial
Research Integrity: Statistical Methods for Monitoring Data Integrity - Part 1
0
rewiews
Discover statistical methods for monitoring data integrity in research, focusing on techniques to identify truthful results and detect potential research misconduct in clinical trials.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Ben Eater
How Cyclic Redundancy Checks (CRCs) Work - Error Detection in Data Transmission
0
rewiews
Explore cyclic redundancy check (CRC), a common error detection method, and learn about its mathematical principles and effectiveness in catching specific types of errors.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Devoxx
Seamless Transactions - A Guide to Database Operations in Golang
0
rewiews
Master database transaction handling in Golang through practical techniques for implementing robust, clean, and efficient data operations across different layers while avoiding common pitfalls.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Caleb Curry
MySQL All-in-One Quick Concepts Tutorial Series
0
rewiews
Comprehensive MySQL tutorial covering key concepts, installation, database design, relationships, and data integrity for beginners and intermediate users.
Add to list
15
Lesons
2 hours 53 minutes
On-Demand
Free-Video
Hussein Nasser
Relational Database ACID Transactions - Explained by Example
0
rewiews
Comprehensive exploration of ACID properties in relational databases, covering atomicity, consistency, isolation, and durability with practical examples and in-depth explanations of read phenomena and isolation levels.
Add to list
19
Lesons
43 minutes
On-Demand
Free-Video
Krish Naik
SQL Constraints Tutorial - Part 1
0
rewiews
Learn SQL constraints including Not Null, Unique, and Primary Key to ensure data accuracy and reliability in MySQL databases. Practical examples and implementation techniques provided.
Add to list
9
Lesons
22 minutes
On-Demand
Free-Video
Oracle
First Principles: Using Redundancy and Recovery for High Durability in OCI Object Storage
0
rewiews
Explore OCI Object Storage's high durability through redundancy and recovery. Learn about replication, erasure coding, and strategies for minimizing disk failures and software bugs.
Add to list
13
Lesons
20 minutes
On-Demand
Free-Video
Linux Foundation
Confidential Computing and Privacy-Enhancing Technologies - The Landscape
0
rewiews
Explore confidential computing and privacy-enhancing technologies for secure cloud adoption. Compare approaches, discuss open source's role, and see a demo using the Enarx project.
Add to list
16
Lesons
40 minutes
On-Demand
Free-Video
Linux Foundation
Becoming Cloud-Native: Shifting Data Management for Application Development
0
rewiews
Explore cloud-native databases, their benefits, and how to choose the right one for your workload. Learn to apply cloud-native principles to the data layer for better application development.
Add to list
18
Lesons
32 minutes
On-Demand
Free-Video
Ruby Central
The Very Hungry Transaction - Managing Growing Database Operations
0
rewiews
Explore how database transactions can grow into liabilities, uncovering problematic patterns that risk data integrity and offering strategies to fix and prevent these issues.
Add to list
1
Lesons
34 minutes
On-Demand
Free-Video
SNIAVideo
Hardware-accelerated Data Integrity Check on Computational Storage Devices
0
rewiews
Discover how hardware-accelerated data integrity checks on Computational Storage Devices enhance performance, reduce data transfer overhead, and enable scalable storage solutions through practical demonstrations.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
USENIX
APRON: Authenticated and Progressive System Image Renovation
0
rewiews
Innovative approach to secure OS recovery, minimizing downtime through progressive block repair and verification. Outperforms conventional methods, enabling swift system restoration with minimal performance impact.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Databricks
Extending Data Governance for AI Use with Collibra and Databricks
0
rewiews
Explore strategies for extending data governance to AI systems, ensuring trust, compliance, and collaboration while integrating Collibra with Databricks Unity Catalog for tailored solutions.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
Neso Academy
File System vs. Database Management System
0
rewiews
Explore advantages of DBMS over file systems, covering data redundancy, access, isolation, integrity, atomicity, concurrency, and security issues with examples.
Add to list
10
Lesons
23 minutes
On-Demand
Free-Video
Open Data Science
Assessing Data Quality - The 3 Facets of Data Fitness
0
rewiews
Explore the three facets of data "fitness" with Susan McGregor. Learn to assess validity, reliability, and representativeness to ensure your data is fit for purpose and unlock its true potential.
Add to list
8
Lesons
32 minutes
On-Demand
Free-Video
Ben Eater
Checksums and Hamming Distance - Error Detection in Data Transmission
0
rewiews
Explore error detection codes, their effectiveness, and calculation methods. Learn about different checksum types and their ability to detect various errors in data transmission.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Ben Eater
Error Detection: Parity Checking
0
rewiews
Learn parity checking for error detection in data transmission, including hardware implementation and practical demonstrations.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
The Missing Chapter in Your CI Playbook - Database Guardrails
0
rewiews
Explore essential database guardrails for CI pipelines, enhancing reliability and efficiency in cloud-native development environments.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
The Cherno
Serialization - Arrays
0
rewiews
Learn efficient techniques for serializing arrays in programming, covering implementation strategies and best practices for handling complex data structures.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Linux Foundation
Are Containers Ready for Production Databases?
0
rewiews
Explore open-source approaches for running stateful database workloads on containers, from Docker and Podman volumes to Kubernetes operators, addressing skepticism about container maturity for production databases.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Linux Foundation
Monitoring for File System Errors in Data Centers - A Guardian Angel Approach
0
rewiews
Explore advanced techniques for monitoring and detecting file system errors in data centers, enhancing reliability and preventing data loss.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
Linux Foundation
Potential Silent Data Loss Caused by Hardware-Poisoned Page Cache
0
rewiews
Explore the risks of silent data loss in Linux systems due to hardware-poisoned page cache and learn strategies to mitigate this critical issue.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Linux Foundation
Copy-on-Write (CoW) Changes in Linux
0
rewiews
Explore Copy-on-Write (CoW) changes in Linux with David Hildenbrand. Gain insights into optimizations, performance improvements, and the latest developments in this crucial file system feature.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
TheIACR
Protocols, Key Agreement, and Commitments - TCC 2022 Session
0
rewiews
Explore cutting-edge research on cryptographic protocols, key agreement mechanisms, and commitment schemes in this IACR conference session.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
TheIACR
Secure Hash Functions - Advances and Applications
0
rewiews
Explore cutting-edge developments in secure hash functions at Crypto 2022, featuring expert presentations on cryptographic advancements and their applications.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
TheIACR
Functional Commitments, Proofs, and Multi-Party Computation - AC 2023 Session
0
rewiews
Explore cutting-edge cryptographic techniques in functional commitments, proofs, and secure multi-party computation at this advanced IACR session.
Add to list
1
Lesons
1 hour 23 minutes
On-Demand
Free-Video
Linux Foundation
Enforcing Data Quality in Data Processing and ML Pipelines with Flyte and Pandera
0
rewiews
Learn to enforce data quality in processing and ML pipelines using Flyte and Pandera, enhancing reliability and efficiency in data-driven projects.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Simons Institute
Error Correction for Streaming Messages
0
rewiews
Explores error-resilient encoding for streaming data, enabling accurate sketch computation despite message corruption while maintaining efficiency in communication and space complexity.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
RSA Conference
Navigating the AI Frontier - The Role of the CISO in GenAI Governance
0
rewiews
Discover how CISOs can lead AI governance, balancing risk management and innovation. Learn to integrate AI safeguards, ensure data integrity, and foster responsible practices with a comprehensive framework and roadmap.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Linux Foundation
Untorn Buffered Writes in Linux File Systems
0
rewiews
Explore advanced Linux file system techniques with experts Theodore Ts'o and John Garry, focusing on untorn buffered writes for improved data integrity and performance.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Devoxx Poland
Before It's Too Late: Finding Real-Time Holes in Data
0
rewiews
Discover techniques for identifying and addressing real-time data gaps, enhancing data integrity and decision-making in dynamic environments.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
BSidesLV
Rock Salt - A Method for Securely Storing and Utilizing Password Validation Data
0
rewiews
Explore a secure method for password storage and validation, addressing enterprise challenges and potential attacks while discussing advantages and limitations.
Add to list
24
Lesons
43 minutes
On-Demand
Free-Video
TED
Where's the Rest of the Data Iceberg?
0
rewiews
Explore the hidden world of unpublished research and its impact on scientific understanding, revealing how industry bias skews our knowledge and affects decision-making.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
Strange Loop Conference
Building Real-time Systems with Open Source Technologies
0
rewiews
Learn to build a real-time analytics stack using Kafka, Storm, and Druid for fast, flexible, and reliable data processing. Discover how to combine these technologies with Hadoop for comprehensive analytics solutions.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
RSA Conference
What Really Happens When Hackers Attack Medical Devices
0
rewiews
Explore medical device hacking, FDA regulations, and cybersecurity in healthcare. Includes live demo of network attack and interactive code session on data integrity protection.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
BruCON Security Conference
Secure Channels - Building Real World Crypto Systems
0
rewiews
Explore secure channel cryptography, including key establishment, data protection, and essential properties. Learn about famous security bugs and recent improvements in SSH and TLS implementations.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Cooper
Kill MD5 - Demystifying Hash Collisions
0
rewiews
Demystify hash collisions and explore the vulnerabilities of MD5 in this engaging talk. Learn about identical prefixes and gain insights into cryptographic security.
Add to list
6
Lesons
30 minutes
On-Demand
Free-Video
media.ccc.de
Practical Brute Force of Military Grade AES-1024 - Sylvain Pelissier, Boi Sletterink
0
rewiews
Análisis de vulnerabilidades en el software de cifrado DataVault, revelando fallas en la derivación de claves y encriptación que comprometen la seguridad de productos de almacenamiento de Sony, SanDisk y Lexar.
Add to list
18
Lesons
1 hour 15 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Data Integrity Based Attacks in Investigative Domains - USENIX Enigma Conference - 2016
0
rewiews
Exploring data integrity attacks in investigative domains, showcasing real-world cases and strategies to defend against misinformation and manipulation in big data analytics.
Add to list
18
Lesons
21 minutes
On-Demand
Free-Video
Linux Foundation
Trusted Execution Environments - A Technical Overview of Intel SGX, Arm TrustZone, and RISC-V PMP
0
rewiews
Explore key trusted execution environments: Intel SGX, Arm TrustZone, and RISC-V PMP. Learn their architectures, security features, and implementation processes for robust data protection.
Add to list
36
Lesons
30 minutes
On-Demand
Free-Video
World Economic Forum
Designing for Cyber-Resilience
0
rewiews
Explore cyber-resilience strategies, risk assessment, and international norms for digital security in an interconnected world.
Add to list
13
Lesons
1 hour
On-Demand
Free-Video
Strange Loop Conference
Building a Unified Cancer Immunotherapy Data Library
0
rewiews
Explore a unified cancer immunotherapy data library leveraging Datomic for efficient storage, querying, and collaboration. Learn about CANDEL's innovative approach to managing complex research data.
Add to list
30
Lesons
46 minutes
On-Demand
Free-Video
USENIX
The Future of the Past - Challenges in Archival Storage
0
rewiews
Explores challenges and advancements in long-term digital data preservation, discussing media technologies, data integrity, and semantic interpretation for future generations.
Add to list
27
Lesons
1 hour 19 minutes
On-Demand
Free-Video
USENIX
Identifying Hidden Dependencies
0
rewiews
Discover how Honeycomb improved system reliability through intentional node termination, uncovering bugs and progressing towards continuous experimentation for enhanced resilience and scalability.
Add to list
51
Lesons
34 minutes
On-Demand
Free-Video
USENIX
Demystifying Machine Learning in Production - Reasoning about a Large-Scale ML Platform
0
rewiews
Explore techniques for managing and improving reliability in large-scale machine learning production systems, focusing on common failure modes, best practices, and practical strategies for SREs.
Add to list
15
Lesons
29 minutes
On-Demand
Free-Video
Security BSides San Francisco
Cats in My Certificate Transparency Logs
0
rewiews
Explore Certificate Transparency logs: their purpose, functionality, and potential misuse. Learn about SCTs, public keys, and novel applications, including finding cat pictures online.
Add to list
23
Lesons
33 minutes
On-Demand
Free-Video
Black Hat
Managing Election Data - The California Recall
0
rewiews
Explore the challenges and complexities of managing election data, focusing on the California Recall case study. Gain insights into data integrity and security in electoral processes.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
PHP UK Conference
Doctrine ORM Good Practices and Tricks
0
rewiews
Explore Doctrine ORM best practices, entity design, and performance optimization. Learn to model your domain effectively and avoid common pitfalls in ORM usage.
Add to list
55
Lesons
59 minutes
On-Demand
Free-Video
PHP UK Conference
Locking and Concurrency Control
0
rewiews
Explore database locking, concurrency control, and data integrity in RDBMS. Learn about locks, MVCC, deadlocks, transactions, and isolation levels, with practical examples using MySQL 5.6.
Add to list
43
Lesons
58 minutes
On-Demand
Free-Video
Devoxx
Information Storage in DNA
0
rewiews
Explore DNA as a revolutionary digital storage medium, its potential for long-term archiving, and recent advances in genome science for preserving vast amounts of information.
Add to list
18
Lesons
29 minutes
On-Demand
Free-Video
Devoxx
Transactions and Concurrency Control Patterns
0
rewiews
Explore data integrity in enterprise systems through transaction isolation levels, locking mechanisms, and concurrency control strategies for databases and Hibernate caching.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
44CON Information Security Conference
Why Integrity Is Left Alone and Not Given the TLC It Deserves
0
rewiews
Exploring the neglected aspect of data integrity in information security, its importance for business decisions, and practical solutions for ensuring data accuracy.
Add to list
12
Lesons
31 minutes
On-Demand
Free-Video
PASS Data Community Summit
Data Integrity Demystified
0
rewiews
Explore data integrity fundamentals, from table design to constraints, and learn how database constructs enforce it. Understand its importance and implementation for meaningful, reliable data.
Add to list
23
Lesons
1 hour 23 minutes
On-Demand
Free-Video
3rd Party Data Burns
0
rewiews
Explore third-party data analysis techniques, focusing on normalization, wildcards, and domain keys. Learn valuable lessons for effective red-teaming and data management.
Add to list
10
Lesons
46 minutes
On-Demand
Free-Video
Black Hat
Energy Fraud and Blackouts - Issues with Wireless Metering Protocols
0
rewiews
Análisis de seguridad del protocolo inalámbrico M-Bus para medidores inteligentes, revelando vulnerabilidades que amenazan la privacidad, integridad y fiabilidad de las redes eléctricas avanzadas.
Add to list
21
Lesons
44 minutes
On-Demand
Free-Video
Devoxx
Data Integrity in Smart Infrastructures
0
rewiews
Definizione e garanzia dell'integrità dei dati in infrastrutture smart, con focus su soluzioni basate su blockchain per cicli di vita estesi e decentralizzati.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
USENIX
TAP - Transparent and Privacy-Preserving Data Services
0
rewiews
Explore a novel system for transparent, privacy-preserving data services. Learn about TAP's tree structure, zero-knowledge proofs, and verifiable operations, addressing limitations in existing approaches.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
Cybersecurity Act of 2015 and Other Hot Privacy and Cybersecurity Topics
0
rewiews
Explore key privacy and cybersecurity topics, including the Cybersecurity Act of 2015, EU directives, legal implications, and regulatory guidelines for data protection and integrity.
Add to list
19
Lesons
46 minutes
On-Demand
Free-Video
Cryptology - It's a Scalpel, Not a Hammer
0
rewiews
Explore cryptology's role in cybersecurity, from classic ciphers to modern encryption techniques, and learn how to effectively apply cryptographic principles to protect against various adversarial threats.
Add to list
29
Lesons
55 minutes
On-Demand
Free-Video
TheIACR
Message Authentication Codes
0
rewiews
Explore message authentication codes, their applications in cryptography, and techniques for ensuring data integrity and authenticity in secure communications.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
USENIX
SAGE - Software-based Attestation for GPU Execution
0
rewiews
Explore SAGE, a software-based attestation mechanism for secure GPU execution, offering code integrity, computation integrity, and data protection without hardware support.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
ACCU Conference
Introduction to Verifiable Computing
0
rewiews
Explore cryptographic tools for verifiable computing, enabling clients to outsource and verify computations without re-running them, even with partial input data.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Data Consistency Across Cloud Native Systems
0
rewiews
Explore strategies for maintaining data consistency in distributed cloud environments, focusing on challenges and solutions for modern architectures.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
EuroPython Conference
Multi-document Consistency with MongoDB
0
rewiews
Explore multi-document consistency in MongoDB, focusing on techniques to maintain data integrity across related documents in distributed systems.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
EuroPython Conference
Understanding Encodings
0
rewiews
Learn about character encodings, their history, and practical applications in Python, focusing on Unicode and common encoding issues developers face.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
EuroPython Conference
Ensuring Data Integrity with Asynchronous Programming in a Cloud IoT Core
0
rewiews
Explore AsyncIO for cloud IoT core development, focusing on data integrity and performance. Learn techniques for handling messages, managing connections, and ensuring accurate data in low-cost solutions.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
EuroPython Conference
Unlocking the Power of Raft Consensus with rqlite using Python
0
rewiews
Explore Raft consensus implementation in distributed databases using rqlite and Python. Learn about data integrity, fault tolerance, and high availability in modern applications.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
PASS Data Community Summit
Overlord Tracking Changes, Real Time, in Your Environment
0
rewiews
Track database changes in real-time with Event Notifications. Learn to set up automated alerts, reports, and source control integration for immediate awareness of modifications, enhancing performance and security.
Add to list
18
Lesons
54 minutes
On-Demand
Free-Video
PASS Data Community Summit
Relational Data Modeling Trends for Transactional Applications
0
rewiews
Explore modern data modeling trends for transactional applications, addressing challenges in NoSQL, microservices, and cloud environments. Learn to adapt traditional principles to meet current business demands and facilitate rapid changes.
Add to list
1
Lesons
1 hour 18 minutes
On-Demand
Free-Video
PASS Data Community Summit
Normalization Beyond Third Normal Form
0
rewiews
Explore higher Normal Forms in database design, debunking myths and enhancing your skills. Learn to identify, check, and understand the consequences of violations for improved database architecture.
Add to list
1
Lesons
1 hour 15 minutes
On-Demand
Free-Video
load more...