Personal Information
Organization / Workplace
Denver, CO United States
- Presentations
- Documents
- Infographics
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (RSA Conference 2016)
Sounil Yu
•
8 years ago
AppSec Pipelines and Event based Security
Matt Tesauro
•
7 years ago
Designing APIs and Microservices Using Domain-Driven Design
LaunchAny
•
7 years ago
Choosing Your Log Management Approach: Buy, Build or Outsource
Anton Chuvakin
•
16 years ago
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
•
12 years ago
So You Got That SIEM. NOW What Do You Do? by Dr. Anton Chuvakin
Anton Chuvakin
•
13 years ago
Pivotal HD as a Cloud Foundry Service
Platform CF
•
10 years ago
Best Practices of HA and Replication of PostgreSQL in Virtualized Environments
Jignesh Shah
•
11 years ago
Continuous Quality: What DevOps Means for QA
Jeff Sussna
•
10 years ago
Rishidot research briefing notes Cloudscaling
Rishidot Research
•
11 years ago
Dystopia as a Service
Adrian Cockcroft
•
11 years ago
Gluecon 2013 - Netflix Cloud Native Tutorial Details (part 2)
Adrian Cockcroft
•
10 years ago
Gluecon 2013 - NetflixOSS Cloud Native Tutorial Introduction
Adrian Cockcroft
•
10 years ago
Gluecon keynote
Adrian Cockcroft
•
10 years ago
Webinar: MongoDB 2.4 Feature Demo and Q&A on Hash-based Sharding
MongoDB
•
11 years ago
Implementation Patterns For Software Security Programs
Denim Group
•
11 years ago
Developing Secure Mobile Applications
Denim Group
•
11 years ago
B-Sides Seattle 2012 Offensive Defense
Stephan Chenette
•
11 years ago
Put a Button on It: Removing Barriers to Going Fast
OSCON Byrum
•
12 years ago
CPN208 Failures at Scale & How to Ride Through Them - AWS re: Invent 2012
Amazon Web Services
•
11 years ago