Exploring container image distribution with casync Experiments with the Content Addressable Data Sy…

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=0N5hQBMV6cY



Duration: 17:22
2 views
0


FOSDEM 2018 FOSDEM 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-11Finding a home for docs How to choose the right path for documentation in open source projects
2022-06-11Cypher An evolving query language for property graphs A discussion of new extensions to Cypher
2022-06-11Cumin Flexible and Reliable Automation for the Fleet Real life examples from the Wikimedia Foundat
2022-06-11Finding your way through the QEMU parameter jungle
2022-06-11Current meta of video compression and probable futures or how to hammer things until they work b…
2022-06-11Easy Ada Tooling with Libadalang
2022-06-11DNSSEC for higher performace How aggressive use of DNSSEC validated cache boosts DNS performace
2022-06-11Declarative Extensions for Kubernetes in Go
2022-06-11Device Assignment for VMs in Kubernetes
2022-06-11Combining CVMFS, Nix, Lmod, and EasyBuild at Compute Canada
2022-06-11Exploring container image distribution with casync Experiments with the Content Addressable Data Sy…
2022-06-11Designing a Libre Embedded Mobile RISCV64 SoC Distillation of the best features and pin multiplex…
2022-06-11Developing Enterprise and Community distributions at the same time, impossible openSUSE SUSE ex…
2022-06-11filetract based Programming a Route to Finding Bugs Earlier
2022-06-11CryptPad Encrypted collaborative editing without trusting the server
2022-06-11Every subway network in the world
2022-06-11Drive your NAND within Linux Forget the word nightmare
2022-06-11Easily Secure Your Front and Back End app with Keycloak
2022-06-11filetaining container memory Snapshots and live migration with CRIU
2022-06-11Dep Deep Dive
2022-06-11Developing applications with Swift as Storage System Learn about the API features to power up your …



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering