PluralSight – Containerizing A Software Application With Docker

PluralSight – Containerizing A Software Application With Docker-REBAR
English | Size: 303.97 MB
Category: Tutorial


With the advent of the microservices architecture pattern and enabling technologies such as containers, the way applications are being architected and delivered is changing. Packaging software applications into read-only template images in order to derive immutable application containers, is a key ingredient in this approach, and Docker is at the forefront. In this course, Containerizing a Software Application with Docker, you’ll learn how to package a software application into a Docker image. First, you’ll explore the nature of Docker images, and their relationship with containers. Next, you’ll master how to create Docker images, including authoring a Docker image for a real software application using a Dockerfile. Finally, you’ll discover how to name and share Docker images with a wider audience. By the end of this course, you’ll have gained the required knowledge of techniques and best practice to get started with containerizing your own software applications.

Cloud Academy – Configuring Multiple AWS Accounts With Amazon Macie to Protect Pii Data in S3

Cloud Academy – Configuring Multiple AWS Accounts With Amazon Macie to Protect Pii Data in S3-STM
English | Size: 228.35 MB
Category: Tutorial


Within this course, I will be providing an overview of the relationship between Amazon Macie Master and Member accounts, in addition to a demonstration on how to configure this relationship allowing you to centralize S3 data compliance findings.

BBC – Eminent Monsters (2020)

BBC – Eminent Monsters (2020)
English | Size: 1.30 GB
Category: Documentary


Documentary tracing the shocking truth of our governments’ love affair with torture. In 1950s Montreal, Scottish-born psychiatrist Dr Ewen Cameron experimented on his unwitting patients. His techniques included sensory deprivation, forced comas and LSD injections. His work was covertly funded by the Canadian government and the CIA and since then, his techniques have been used in Northern Ireland, Guantanamo and 27 countries around the world.

O’Reilly – Microsoft MS-101 Certification Course M365 Mobility and Security

O’Reilly – Microsoft MS-101 Certification Course M365 Mobility and Security
English | Size: 1.22 GB
Category: Tutorial


Explore a preview version of NEW! Microsoft MS-101 Certification Course: M365 Mobility and Security right now.
With the NEW MS-101 Certification Course: M365 Mobility and Security, you’ll be able to take and pass the MS-101 exam. This exam, coupled with the MS-100 exam, will award you the “Microsoft 365 Certified” Enterprise Administrator Expert” certification. As a prerequisite for this course, it is recommended that you: Have some foundational knowledge of Microsoft 365 features and services. If you are looking to gain a base knowledge of M365, check out the MS-900 M365 Fundamentals course. Have taken and passed the MS-100: M365 Identity and Services exam. If you haven’t taken the course or exam yet, have a look at the Skylines Academy MS-100 M365 Identity and Services course, also by David Hood. This course includes the following curriculum: – Introduction and Study Resources – Implement Modern Device Services – Implement M365 Security and Threat Management – Manage M365 Governance and Compliance Lectures will educate you on the terms and principles of the M365 platform and demos will enable you with a hands-on experience using scenarios to empower you in the real world.

Cloud Academy – Implementing Continuous Feedback With Azure Devops

Cloud Academy – Implementing Continuous Feedback With Azure Devops-STM
English | Size: 973.41 MB
Category: Tutorial


The application lifecycle doesn’t finish with app deployment. Feedback is an important element of refining an application, whether that’s exception detection and diagnoses or improving the user experience. In this course, we will look at a suite of services that capture a vast array of feedback data, ranging from exceptions to client and server telemetry. This data can be turned into easily digestible information that can be used to trigger alerts and feedback into the development lifecycle as work items.