Using graph databases in popular open source CMSs Neo4J and Drupal, potential application areas and

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=2knzXHyi96k



Duration: 31:47
3 views
0


FOSDEM 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-09Welcome to FOSDEM 2017
2022-06-09The birth of HPC Cuba How supercomputing is being made available to all Cuban researchers using FOSS
2022-06-09Writing a functional DPDK application from scratch
2022-06-09The Internet Cube La Brique Internet
2022-06-09The Veripeditus AR Game Framework Enabling everyone to freely create Augmented Reality Games
2022-06-09The VFS paradigm from the perspective of a component OS
2022-06-09Testing with volcanoes FuegoLAVA Embedded testing going distributed
2022-06-09Welcome Word Backup and Disaster Recovery devroom Introduction and welcome word
2022-06-09What to expect from MySQL 8 0
2022-06-09Why you should care about SQL for big data and how Apache Calcite can help SQL4NoSQL
2022-06-09Using graph databases in popular open source CMSs Neo4J and Drupal, potential application areas and
2022-06-09Why should we take an interest in Open Design Thoughts and initiatives to open the creative process
2022-06-09Working with spatial data in Go
2022-06-09Using Linux in Air Traffic Control Hardware and Operating System Platforms
2022-06-09What does Monitoring mean
2022-06-09Tensor Processing and Machine Learning for Signal Processing Functional Algorithm Definition and Co
2022-06-09User interfaces with Guile and their application
2022-06-09WebRender, the next generation graphics engine by Mozilla research A technical talk about the web r
2022-06-09Welcoming and Introduction
2022-06-09Web Development and Perl 6
2022-06-09What legal and policy issues concerning FOSS need to be systematically researched



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering