Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Next generation cloud security – A deeper dive into application and API security Dominic Lovell, Solutions Engineering Manager, ANZ | Sreejith Muraleedharan, Senior Solutions Engineer In our previous session, we discussed how Akamai’s App and API protector streamlines the protection of your web applications and API in a dynamic and ... June 22, 2023 5:00am AS3 GTI Provisioning AppViewX Featuring a demo of AppViewX’s ADC+ solution on how AppViewX can be used to manage BIG-IPs more efficiently. We will begin with a short demonstration ... 6 months ago | 5 mins F5 CVE Reporting AppViewX If you're struggling to keep up with your application monitoring and reporting, AppViewX ADC+ can help. This video will show you how it can: - Automa... 6 months ago | 4 mins Creating Great-Looking PDFs From XML DITA Guests: Joanne Hannagen & Corinna Kinchin > Host: Scott Abel Join us for this presentation from Joanne Hannagen & Corinna Kinchin of Datazone, the developers of MiramoPDF, the intuitive, GUI-driven PDF-formatter... 8 months ago | 55 mins Sencha Day 2022 : An early preview of Sencha Rapid Ext JS Marc Gusmano, Sencha Product Architect (Sencha) In this session we will explore an early preview of Sencha’s newest Ext JS development tool, Rapid ExtJS. “Rapid Ext JS is designed to speed up applic... 7 months ago | 40 mins Podcast | Weaning Yourself Away From GUI-Based AD Administration Mike Kanakos Continuous learning when it comes to being an AD Admin is a requirement as they’re tasked with adapting to maintain relevancy. Mike Kanakos (Senior Sy... 3 years ago | 16 mins Navigating the 128 Technology GUI Justin Melloni, Training Lead 128 Technology The GUI on the 128 Technology Conductors and Routers is very powerful when it comes to monitoring your network. However, there are a lot of menus and ... 3 years ago | 60 mins Mobile Malware Reverse Engineering Workshop Victor Chebyshev, Lead Security Researcher on the Kaspersky Global Research & Analysis Team (GReAT) Vicious attackers target both Android and iOS devices using specifically designed mobile malware. Consequently, it is imperative that reversers know h... 12 months ago | 123 mins Automating Data Transformations for NetOps Teams Rich Martin, Senior Technical Marketing Engineer, Itential One of the primary reasons that automating “the network” has become a complex task is because today’s network infrastructure is comprised of many diff... 10 months ago | 63 mins PowerStore Session 2 of 5 - Deep Dive on Automation in Operation & Cloud-IQ Dell Technologies Whether your IT staff focuses on managing from a storage, hypervisor or application perspective, PowerStore is integrated with all these approaches. T... 3 years ago | 41 mins Load more