Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Integrating Apache Kafka Into Your Environment Russ Sayers, Sr. Technical Trainer, Confluent Integrating Apache Kafka with other systems in a reliable and scalable way is a key part of an event streaming platform. This session will show you ho... 3 years ago | 52 mins Teil 3: Schema Registry & REST Proxy: Mehr Qualität und Flexibilität im Kafka Cl Kai Waehner, Technology Evangelist, Confluent Mit der raschen Zunahme des Einsatzes von Apache Kafka innerhalb von Organisationen stehen Fragen der Data Governance und Datenqualität im Mittelpunkt... 5 years ago | 33 mins Building Event-Driven Applications with Apache Kafka & Confluent Platform Viktor Gamov, Developer Advocate, Confluent Apache Kafka® has become the de facto technology for real-time event streaming. Confluent Platform, developed by the creators of Apache Kafka, is an e... 4 years ago | 43 mins SUSE Rancher and Kubernetes Secrets: How to Encrypt Your Data in the Cloud? Nicolas Vermande, Principal Developer Advocate, Ondat Secrets are not so secret in Kubernetes! You may be aware that SUSE Rancher can be configured to enable Kubernetes Secrets Encryption. But the encrypt... 9 months ago | 27 mins Next Generation Endpoint: Launching Symantec Endpoint Protection 14 Sunil Choudrie, Global Solutions Marketing Mngr & Jose Carlos Cerezo, Senior Product Manager Attackers are employing more sophisticated techniques. You need a solution that combines proven and next generation endpoint technology to address th... 6 years ago | 64 mins Webinar – How leading companies are attracting new investors IR Magazine & Q4 With the Q2 earnings cycle behind you, it’s time to turn your attention to investor targeting. While many issuers were cautious about too much investo... 3 years ago | 61 mins Lancement de Symantec Endpoint Protection 14 Hervé Doreau, Directeur Technique – Symantec France Les attaquants emploient des techniques encore plus sophistiquées. Vous avez besoin d'une solution qui allie des technologies de sécurité des terminau... 6 years ago | 48 mins How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced... 6 years ago | 55 mins Avoid Invaluable Media Loss with eMAM & B2 Dave Miller, eMAM. Nilay Patel, Backblaze Any organization that creates rich media under tight deadlines and budget constraints knows the pain of losing data. Learn how using eMam and B2 toget... 5 years ago | 28 mins Easy Ways To Improve Your Security Posture Kirk Gibbons System Engineer, Symantec and Q&A with Gavin Fulton & Sunil Choudrie Imagine if you could respond to vulnerabilities, in real-time, and prevent the spread of infection through your network. It’s possible—if your network... 6 years ago | 36 mins