Deploying PostgreSQL on Kubernetes

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=toAQZ8UqFBE



Duration: 50:10
21 views
0


FOSDEM 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-23bmclib A Baseboard Management Controller library One library to rule them all
2022-06-23DNS as code with octodns Versioning and keep track of your dns records changes and automatize all t…
2022-06-23Component based Design System and Development
2022-06-23ElasticSearch Correctness and perfOrmance Validator Formally measuring the cost of a query before h…
2022-06-23Fedora on RISC V 64 bit Introduction, Brief Overview and Latest Developments
2022-06-23BinAST Let's make the javascript startup bottleneck a thing of the past
2022-06-23Feature store A Data Management Layer for Machine Learning Data Management for ML
2022-06-23Complex cameras are were complex How to make complex cameras easier an update from the Libcamer…
2022-06-23ELI5 ZFS Caching Explain Like I'm 5 How the ZFS Adaptive Replacement Cache works
2022-06-23Beyond the webrtc org monoculture Alternative WebRTC implementations in C and Python
2022-06-23Deploying PostgreSQL on Kubernetes
2022-06-23EBUs Live IP Software Toolkit Open Source Software in professional media
2022-06-23Fearless Multimedia Programming using GStreamer & Rust
2022-06-23Extending syslog ng in Python Best of both worlds
2022-06-23Compiling the Linux kernel with LLVM tools
2022-06-23DNS and the Internet's architecture the DoH dilemma Impacts of DNS over HTTPS on how the Internet
2022-06-23fileverse Open, federated teamchat with XMPP
2022-06-23Beyond The First Steps Key ideas and advices to improve your development posture
2022-06-23Extending Numba
2022-06-23Demystifying Coroutines and Asynchronous Programming in Python
2022-06-23eBPF powered Distributed Kubernetes performance analysis



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering