CrateDB A Search Engine or a Database Both How We Built a SQL database on top of Elasticsearch a…

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=OaqzgnoaJa0



Duration: 25:16
22 views
1


FOSDEM 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-11Crowdsupply EOMA68 Progress Report A summary of the past year working on fulfilling the pledges fro…
2022-06-11filesensus as a Service Twenty Years of OSI Stewardship
2022-06-11Fleet Commander The efficient way of managing the Desktop profiles of your fleet A brief descript…
2022-06-11EU FOSSA 2 OSS bug bounties sponsored by the EU
2022-06-11filenecting the Edge Project Flogo as Ultra lightweight IoT Apps framework
2022-06-11Etienne Saliez A look at Natural Intelligence IMMM Interactive Medical Mind Maps
2022-06-11DLR CAFE CUDA Filterbank Updates Brand New Arbitrary Resamplers for everyone
2022-06-11DOSEMU and FreeDOS past, present and future
2022-06-11De mystifying contributing to PostgreSQL
2022-06-11DIY Java Static Analysis Presenting the internals of SonarJava a static analyzer for Java written…
2022-06-11CrateDB A Search Engine or a Database Both How We Built a SQL database on top of Elasticsearch a…
2022-06-11Computer Vision Using Go And OpenCV
2022-06-11Componolit a component based open source platform for trustworthy mobile devices Deprivileging th…
2022-06-09Shenandoah Why Do We Need Yet Another Garbage Collector
2022-06-09The distributed systems behind Ring BlockChain and OpenDHT
2022-06-09The Document Foundation Development Dashboard hands on
2022-06-09Virtualization on the Hurd
2022-06-09Using LNT to track performance
2022-06-09Yet Another repoman How We Do CI at oVirt
2022-06-09The PTags Linux Security Module
2022-06-09Workflow management with GNU Guix



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering