Building an Inclusive Culture with ERGs
40:58
Marketing Careers at Datadog
2:58
Datadog Paris Office Tour
2:38
2 ай бұрын
And What About my User Experience?
10:11
Security at the Speed of Cloud
13:10
DASH is returning to NYC!
1:08
2 ай бұрын
Пікірлер
@sbimochan
@sbimochan 23 сағат бұрын
Really helpful content.
@KimberlyMoore-c1r
@KimberlyMoore-c1r Күн бұрын
Great teamwork data dog you made a better priority everyone to understand
@RubyCheng-tz4oh
@RubyCheng-tz4oh 17 күн бұрын
Hi, thank you for providing this. Since this video was filmed 4 years ago, are there any other resources I can refer to?
@Voidroamer
@Voidroamer 19 күн бұрын
would you look at that, an actually useful demo! Thanks :) MicroFocus could learn a thing or two from you..
@divyavishwakarma2002
@divyavishwakarma2002 19 күн бұрын
How does one look into a similar proc filesystem in MacOS where we'll find information for all the processes like the way it's shown in the video?
@gemini_537
@gemini_537 22 күн бұрын
Gemini 1.5 Pro: This video is part of a series on container security fundamentals. In this particular video, the focus is on Linux capabilities and how they are used to limit privileges within containers. The video starts with a brief explanation of traditional methods for giving users privileged access on a Linux host. These methods, such as using sudo or setting a binary as setuid root, are not very granular and can be security risks. Capabilities are a more granular way to grant privileges. They allow a file or process to have a small subset of root's overall privileges. There are 41 different capabilities available in Linux. The video then demonstrates how to view capabilities on the host using the pscap command. This command shows which processes have all or some of the capabilities available. For example, the systemd process has the net_raw capability, which allows it to create raw network packets. Another way to view capabilities is with the filecap command. This command can be used to see which files have capabilities assigned to them. For example, the ping utility has the net_raw capability assigned to it, which allows it to create ICMP network packets. The video then discusses how Docker handles container privileges. By default, Docker assigns a set of capabilities to each container that it runs. This set of capabilities is designed to allow most containerized workflows to run without problems, but it also avoids giving containers too many privileges that could be used to escalate privileges. The next video in the series will cover how to harden containers by reducing the number of capabilities that are assigned to them by default.
@claireblake3852
@claireblake3852 25 күн бұрын
I work as a freshly promoted account manager team leader managing 12 people and despite the vastly different industries, these principles are going to help me immensely so thank you - I've found so much value in this <3
@NT-qd2rs
@NT-qd2rs 13 күн бұрын
I've managed 16, we'll see if I learn smth new 😊
@gemini_537
@gemini_537 26 күн бұрын
Gemini 1.5 Pro: This video is the first part of a series on container security fundamentals. In this video, the speaker explains that containers are essentially just processes. The speaker demonstrates this by showing how you can interact with a container using standard Linux process tools. First, the speaker runs a PS command to list all the processes on the machine. The command returns nothing because there are no nginx web servers running. Then, the speaker creates a new container running the nginx container image. After the container is created, the speaker reruns the PS command and finds a new process with the ID 46727. This process is the nginx web server that is running inside the container. Next, the speaker creates a new file called "my_new_file" inside the container using the docker exec command. Then, the speaker uses the sudo ls command to look inside the proc file system. The proc file system contains information about all the running processes on the machine, including containers. The speaker navigates to the root directory of the process with ID 46727 (the nginx container) and finds the file "my_new_file" that was created earlier. This demonstrates that containers are just processes and that you can interact with them using standard Linux tools. In future videos, the speaker will delve more into how containers appear to be isolated even though they are just processes.
@gemini_537
@gemini_537 28 күн бұрын
Gemini 1.5 Pro: This video is part one of a series on container security fundamentals. In this part, the video talks about Linux namespaces and how they are used to isolate resources on a host. The video starts by explaining what Linux namespaces are and the different types of namespaces that are available. There are eight namespaces available in total, but only six of them are enabled by default when using Docker containers. These six namespaces are mount, network, PID, IPC, UTS, and cgroups. The video then goes into detail about how to use the `lsns` command to list the namespaces on a machine. This command shows the number of processes using a given set of namespaces. The video also explains how to use the `findmnt` command to view how the mount namespace has been set up for a container. This command shows all of the information about the mounted file systems for that process. Finally, the video talks about how to use the `NS enter` program to interact with different Linux namespaces. This program allows you to run commands in the namespace of a process. This can be useful for inspecting a container on a machine without having to use Docker tooling. The next video in the series will go into more depth about some of the other namespaces that are used by Linux containers.
@happyloo2023
@happyloo2023 28 күн бұрын
Hello? Let me introduce a new product for dogs that I developed. I upgraded the product four times with faith for 10 years and finally completed it. Currently on sale on Naver in Korea, it is enjoying 99 percent satisfaction and top popularity among consumers. It automatically cleans the dog's urine with water. And it has no movement, so the dog uses it easily and comfortably.
@dembadiop3395
@dembadiop3395 Ай бұрын
Ce que je sais et si le saucisse ne se fait pas comme devait se faire la parole la France et je ne l'écris jamais ayé gage
@Hasan-ow2tr
@Hasan-ow2tr Ай бұрын
عالی
@DAVIDOZERSKY
@DAVIDOZERSKY Ай бұрын
Firebase performance monitoring automatically tracks all network requests made using OkHttp and function calls. How does Datadog compare in this regard? Are their difference in the automatic traces that are captured by each product?
@StevanNetto-qg7gx
@StevanNetto-qg7gx Ай бұрын
"research organisation" 😂
@brandydurdengonzalez
@brandydurdengonzalez Ай бұрын
Thank you, for the conversation! Really enjoyed the feedback from the Jesse Gonzalez. Interesting stuff
@IOSARBX
@IOSARBX Ай бұрын
Datadog, I love your channel so much, I just had to subscribe!
@Shiv-qv7dv
@Shiv-qv7dv Ай бұрын
Excellent
@ROBERTHARRISON-zo7hl
@ROBERTHARRISON-zo7hl Ай бұрын
Logistics
@jayesh.savkare
@jayesh.savkare Ай бұрын
Informative !
@g.martino5014
@g.martino5014 Ай бұрын
Scusa eh, ma tu sei Nutello????
@ThzZoltek
@ThzZoltek 2 ай бұрын
Nice video ! thanks !
@LucasCastlebane
@LucasCastlebane 2 ай бұрын
Watchdog legion ai generative super quantum roko basilisk ultra data
@LucasCastlebane
@LucasCastlebane 2 ай бұрын
👏👏👏
@LucasCastlebane
@LucasCastlebane 2 ай бұрын
Generative ai content is my salvation.
@recircular_nature
@recircular_nature 2 ай бұрын
Ok
@NumNutZack
@NumNutZack 2 ай бұрын
Love it & look forward to collaborating with You all!
@KhanTufail-lu7os
@KhanTufail-lu7os 2 ай бұрын
❤❤🎉❤❤
@KhanTufail-lu7os
@KhanTufail-lu7os 2 ай бұрын
31:58
@AliciaSalazarDesigns
@AliciaSalazarDesigns 2 ай бұрын
Great presentation!
@johntswan
@johntswan 2 ай бұрын
Great video sharing all the great reasons to be a Datadog Partner! Great job Jarrod and team!
@EricLim-uu3po
@EricLim-uu3po 2 ай бұрын
the big bgs at 2:17
@GaryHull-ix7jn
@GaryHull-ix7jn 2 ай бұрын
P0rn