Systems | Development | Analytics | API | Testing

Latest Videos

GitTogether | Open Source Dev Containers with DevPod | Hrittik Roy

Many developers are excited about Dev Containers, but until now, people needed to use a managed service like Codespaces or Gitpod to experience that Dev Container magic. DevPod is a new open-source tool that allows users to launch Dev Containers with any infrastructure they have available. DevPod introduces a way to define a development environment that can then be run on any cloud infrastructure or even on a localhost machine using Docker or Kubernetes locally or on the cloud. This talk is all about how you can use DevPod locally or on cloud to run your developer workloads easily.

How Snowflake Powers The Next Generation Of Cybersecurity Applications

Cybersecurity is extremely data-intensive and complex. Top cybersecurity companies such as Lacework, Sophos, Panther, Hunters, Auditboard, Orca Security, and Dassana leverage Snowflake to provide out-of-the-box solutions. These companies are building the next generation of cybersecurity applications by harnessing the power of the Snowflake Data Cloud to provide differentiated product capabilities to security teams.

Event-Driven Architecture (EDA) vs Request/Response (RR)

In this video, Adam Bellemare compares and contrasts Event-Driven and Request-Driven Architectures to give you a better idea of the tradeoffs and benefits involved with each. Many developers start in the synchronous request-response (RR) world, using REST and RPC to build inter-service communications. But tight service-to-service coupling, scalability, fan-out sensitivity, and data access issues can still remain.

How Material Security Protects The Privacy The Productivity Suite

Abhishek Agrawal, Co-founder and CEO of Material Security, chats with "Powered by Snowflake" host Phoebe He about his company's mission to protect the productivity suite, namely Microsoft 365 and Google Workspace. Its customer base crosses all industries as well as customers of all sizes. The conversation includes a demo of the platform that shows how to set up the solution and the kind of reports it generates for an organization's security team. It also covers how the solution accounts for organization's who have employees working from home and who use their mobile phones to conduct business communications.

Displaying Google Dorking: Revealing Hidden Online Information | Security Testing | BugRaptors

Dive into the realm of Google Dorking, also known as Google Hacking, an advanced method leveraging specialized search queries to unveil concealed data, exposed databases, and potential security vulnerabilities across the web. Join us as we explore the responsible application of this technique for information retrieval and delve into the critical importance of safeguarding against potential risks lurking in the digital landscape.

Confluent Connectors | Fast, frictionless, and secure Apache Kafka integrations

Every company faces the perennial problem of data integration but often experiences data silos, data quality issues, and data loss from point-to-point, batch-based integrations. Connectors decouple data sources and sinks through Apache Kafka, simplifying your architecture while providing flexibility, resiliency, and reliability at a massive scale.

How to Create Visual Button Selection States - Do More with Qlik

Ever wonder how those Qlik experts make those awesome interactive dashboards? It is easier than you think. Check out this video that quickly shows you how to create custom beautiful buttons to apply selections and visually represent an active or non-active selection state. Allowing users just another way to analyze data in a way that is easy and familiar.

Are We in an AI Information Bubble?

Are we in an AI bubble? We can't stop talking about AI in tech. It's at every conference and in every startup pitch. But is the rest of the world as enamored as we are? In this conversation, we explore AI’s impact beyond the echo chamber of the tech industry. We look at attitudes toward AI in other spaces, from healthcare to finance, weighing the risks and benefits of its application. We also look to the future, questioning whether we’ve reached the limits of AI given compute power constraints.