Found 61 presentations matching your search
The architecture of the Database system is described in detail with a neat block diagram and each co...
audio
Web Development
Different Unix Commands
Azure Container Apps is a serverless platform that allows you to maintain less infrastructure and sa...
The OWASP Zed Attack Proxy (ZAP) is a widely used open-source web application security testing tool....
Covered every aspect of SSDT project from various source to start with boilerplate code for better p...
This slide presents a stacked patch antenna designed to achieve broadband circular polarization and ...
for counting frictional resistance of rotating shaft dynamometers are used. by finding frictional re...
Hadoop
Find out about Jellyfish, a collection of modules that you can install on your server to give your c...
08-13-2024 NYC Meetup Unstructured Data Processing From Cloud to Edge (Milvus) https://www.meetup.c...
How does Vector RAG fare against Graph RAG for AI accuracy and reliability? The Tars and CogniSwitch...
Data Scientist ROADMAP to kick start your career
Secucity in the AI and Web3 era - Nguyễn Duy Lân - Veramine
Communication theory
An overview of GenAI, Prompt Engineering and GitHub Copilot. Also includes some demos.
Are you developing AWS Lambda functions with Python? Always looking for tools to make you more produ...
Presentation as presented on the Global Azure bootcamp at Betabit Utrecht on 22 April 2017.
In this talk, we’ll explore the types of production failures and the unique impact that each has o...
The default security settings of services from GCP is not fine tuned for security. Let's walk th...
Troy Nyi Nyi, Global Head of Commercial – Fraud at BPC on Building Resilient and Fraud Prevention ...
This slide contain application of ultrasound and biological effects of ultrasound , ppt contains ma...