SlideShare une entreprise Scribd logo
1  sur  27
MCP/MCTS
Radu
Vunvulea
Technology
enthusiastic
Azure MVP
Blogger
Speaker
Open
minded
Geek
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
!
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
DBDB
Storage
Storage
Storage
VM
Storage
VM
VM
Backup
Audit
Security
Center
Monitor
ing
VM
VM
VM
Subnet
Subnet
Virtual
Appliance
IN & OUT 53 DNS traffic cannonical port Allowed
IN 3389 Remote Desktop
Connection
Allowed
IN All Traffic from internet to our
firewall (Virtual Appliance -
NGFW)
Allowed
OUT* 1688 VM Licence check Allowed
OUT All Traffic from VNET to
internet
Denied
IN** 168.63.129.16 Unique IP used by Azure
for DHCP, DNS, Azure Load
Balance
Allow
VNET | Subnet | UDR | IP FW | NGS | Site-to-Site VPN | Point-to-Site VPN | Express Route
Questions
Answers
{
“name” : “Radu Vunvulea,
“blog” : “vunvulearadu.blogspot.com”,
“email” : ”vunvulear@outlook.com”,
“socialMedia” :
{
“twitter” : “@RaduVunvulea”,
“fb” : “radu.vunvulea”
}
}
https://github.com/Microsoft/azure-
docs/blob/master/articles/best-practices-network-
security.md
{
“name” : “Radu Vunvulea,
“blog” : “vunvulearadu.blogspot.com”,
“email” : ”vunvulear@outlook.com”,
“socialMedia” :
{
“twitter” : “@RaduVunvulea”,
“fb” : “radu.vunvulea”
}
}

Contenu connexe

Tendances

The Experience of Java on Kubernetes with Microservices from HackFest
The Experience of Java on Kubernetes with Microservices from HackFestThe Experience of Java on Kubernetes with Microservices from HackFest
The Experience of Java on Kubernetes with Microservices from HackFestYoshio Terada
 
WebAssembly with Rust
WebAssembly with RustWebAssembly with Rust
WebAssembly with RustKnoldus Inc.
 
Gwava con one thing we can do better
Gwava con one thing we can do betterGwava con one thing we can do better
Gwava con one thing we can do betterGWAVA
 
Oracle Weblogic Server training and consultation
Oracle Weblogic Server training and consultationOracle Weblogic Server training and consultation
Oracle Weblogic Server training and consultationFaisal Khan
 
마이크로소프트 Azure 에서 안드로이드 Push 구현과 Data 처리
마이크로소프트 Azure 에서 안드로이드  Push 구현과 Data 처리마이크로소프트 Azure 에서 안드로이드  Push 구현과 Data 처리
마이크로소프트 Azure 에서 안드로이드 Push 구현과 Data 처리Young D
 
Presentatie 3Fifty: TOPdesk-MS SCOM-koppeling
Presentatie 3Fifty: TOPdesk-MS SCOM-koppelingPresentatie 3Fifty: TOPdesk-MS SCOM-koppeling
Presentatie 3Fifty: TOPdesk-MS SCOM-koppelingTOPdesk
 
Configuring v sphere 5 profile driven storage
Configuring v sphere 5 profile driven storageConfiguring v sphere 5 profile driven storage
Configuring v sphere 5 profile driven storagevirtualsouthwest
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Securitysyrinxtech
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentationwebhostingguy
 

Tendances (9)

The Experience of Java on Kubernetes with Microservices from HackFest
The Experience of Java on Kubernetes with Microservices from HackFestThe Experience of Java on Kubernetes with Microservices from HackFest
The Experience of Java on Kubernetes with Microservices from HackFest
 
WebAssembly with Rust
WebAssembly with RustWebAssembly with Rust
WebAssembly with Rust
 
Gwava con one thing we can do better
Gwava con one thing we can do betterGwava con one thing we can do better
Gwava con one thing we can do better
 
Oracle Weblogic Server training and consultation
Oracle Weblogic Server training and consultationOracle Weblogic Server training and consultation
Oracle Weblogic Server training and consultation
 
마이크로소프트 Azure 에서 안드로이드 Push 구현과 Data 처리
마이크로소프트 Azure 에서 안드로이드  Push 구현과 Data 처리마이크로소프트 Azure 에서 안드로이드  Push 구현과 Data 처리
마이크로소프트 Azure 에서 안드로이드 Push 구현과 Data 처리
 
Presentatie 3Fifty: TOPdesk-MS SCOM-koppeling
Presentatie 3Fifty: TOPdesk-MS SCOM-koppelingPresentatie 3Fifty: TOPdesk-MS SCOM-koppeling
Presentatie 3Fifty: TOPdesk-MS SCOM-koppeling
 
Configuring v sphere 5 profile driven storage
Configuring v sphere 5 profile driven storageConfiguring v sphere 5 profile driven storage
Configuring v sphere 5 profile driven storage
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 

Similaire à Network isolated inside a cloud environment Radu Vunvulea DevTalks 2017 Cluj Romania

LINSTOR Is Like Kubernetes, But for Block Devices
LINSTOR Is Like Kubernetes, But for Block DevicesLINSTOR Is Like Kubernetes, But for Block Devices
LINSTOR Is Like Kubernetes, But for Block DevicesAndrei Kvapil
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2vivekbhat
 
All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016Veeam Software
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2vivekbhat
 
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"PROIDEA
 
vSphere with Tanzu Tech Overview 7.0 U1 (1).pptx
vSphere with Tanzu Tech Overview 7.0 U1 (1).pptxvSphere with Tanzu Tech Overview 7.0 U1 (1).pptx
vSphere with Tanzu Tech Overview 7.0 U1 (1).pptxhokismen
 
WCM Server Model (web content management)
WCM Server Model (web content management)WCM Server Model (web content management)
WCM Server Model (web content management)Jonathan Woolson
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Securityguestb09e16
 
CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012
CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012
CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012Spiffy
 
ZERTO Introduction to End User Presentation
ZERTO Introduction to End User PresentationZERTO Introduction to End User Presentation
ZERTO Introduction to End User PresentationBusinesstoVirtual
 
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data CenterVMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data CenterVMworld
 
Azure Security: How to protect a hybrid PaaS-IaaS solution built entirely in ...
Azure Security: How to protect a hybrid PaaS-IaaS solution built entirely in ...Azure Security: How to protect a hybrid PaaS-IaaS solution built entirely in ...
Azure Security: How to protect a hybrid PaaS-IaaS solution built entirely in ...Lorenzo Barbieri
 
VMWARE Professionals - Intro to System Center 2012 SP1
VMWARE Professionals -  Intro to System Center 2012 SP1VMWARE Professionals -  Intro to System Center 2012 SP1
VMWARE Professionals - Intro to System Center 2012 SP1Paulo Freitas
 
VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and ResiliencyPaulo Freitas
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware CloudTudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware CloudITSpark Community
 
System Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureSystem Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureBryan Dady
 
VMworld 2013: Tech Preview: Accelerating Data Operations Using VMware VVols a...
VMworld 2013: Tech Preview: Accelerating Data Operations Using VMware VVols a...VMworld 2013: Tech Preview: Accelerating Data Operations Using VMware VVols a...
VMworld 2013: Tech Preview: Accelerating Data Operations Using VMware VVols a...VMworld
 
Zerto 4.0 the standard for disaster recovery
Zerto 4.0 the standard for disaster recoveryZerto 4.0 the standard for disaster recovery
Zerto 4.0 the standard for disaster recoveryVLCM2015
 
Zerto 4.0 the standard for disaster recovery
Zerto 4.0 the standard for disaster recoveryZerto 4.0 the standard for disaster recovery
Zerto 4.0 the standard for disaster recoveryVLCM2015
 

Similaire à Network isolated inside a cloud environment Radu Vunvulea DevTalks 2017 Cluj Romania (20)

LINSTOR Is Like Kubernetes, But for Block Devices
LINSTOR Is Like Kubernetes, But for Block DevicesLINSTOR Is Like Kubernetes, But for Block Devices
LINSTOR Is Like Kubernetes, But for Block Devices
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
 
All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016All you need to know about Microsoft Ignite 2016
All you need to know about Microsoft Ignite 2016
 
CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2CSA Presentation 26th May Virtualization securityv2
CSA Presentation 26th May Virtualization securityv2
 
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
infraxstructure: Stas Levitan, "Always On" business in cloud - 2016"
 
vSphere with Tanzu Tech Overview 7.0 U1 (1).pptx
vSphere with Tanzu Tech Overview 7.0 U1 (1).pptxvSphere with Tanzu Tech Overview 7.0 U1 (1).pptx
vSphere with Tanzu Tech Overview 7.0 U1 (1).pptx
 
WCM Server Model (web content management)
WCM Server Model (web content management)WCM Server Model (web content management)
WCM Server Model (web content management)
 
Virutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter SecurityVirutalization and the Future of Datacenter Security
Virutalization and the Future of Datacenter Security
 
CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012
CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012
CTU June 2011 - Microsoft System Center Virtual Machine Manager 2012
 
ZERTO Introduction to End User Presentation
ZERTO Introduction to End User PresentationZERTO Introduction to End User Presentation
ZERTO Introduction to End User Presentation
 
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data CenterVMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
 
Azure Security: How to protect a hybrid PaaS-IaaS solution built entirely in ...
Azure Security: How to protect a hybrid PaaS-IaaS solution built entirely in ...Azure Security: How to protect a hybrid PaaS-IaaS solution built entirely in ...
Azure Security: How to protect a hybrid PaaS-IaaS solution built entirely in ...
 
VMWARE Professionals - Intro to System Center 2012 SP1
VMWARE Professionals -  Intro to System Center 2012 SP1VMWARE Professionals -  Intro to System Center 2012 SP1
VMWARE Professionals - Intro to System Center 2012 SP1
 
VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and Resiliency
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware CloudTudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
 
System Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureSystem Center 2012 for VMware Infrastructure
System Center 2012 for VMware Infrastructure
 
VMworld 2013: Tech Preview: Accelerating Data Operations Using VMware VVols a...
VMworld 2013: Tech Preview: Accelerating Data Operations Using VMware VVols a...VMworld 2013: Tech Preview: Accelerating Data Operations Using VMware VVols a...
VMworld 2013: Tech Preview: Accelerating Data Operations Using VMware VVols a...
 
Zerto 4.0 the standard for disaster recovery
Zerto 4.0 the standard for disaster recoveryZerto 4.0 the standard for disaster recovery
Zerto 4.0 the standard for disaster recovery
 
Zerto 4.0 the standard for disaster recovery
Zerto 4.0 the standard for disaster recoveryZerto 4.0 the standard for disaster recovery
Zerto 4.0 the standard for disaster recovery
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Network isolated inside a cloud environment Radu Vunvulea DevTalks 2017 Cluj Romania