Channel Avatar

Positive Events Eng @UC9hnMfdwfLd8V5qEc-6MXXQ@youtube.com

2.2K subscribers

See More from this channel...


01:00:16
Panel discussion: challenges of using open source for security
23:40
Managing technological independence in the IT landscape of the oil and gas industry
20:47
GPT native
40:18
Anti-aging. Science
26:53
Cloud, save the culture
22:52
Cyber Battle Award Ceremony Standoff 15
02:39
Positive Hack Days. Live broadcast
42:33
Algorithms against diseases
44:02
Modeling the Future
49:20
VS Code: getting the most out of our IDE—and even more
32:04
Relax, it's all over now
22:54
Getting to know the world of cyber security
26:28
Happiness Algorithms
26:38
How we made the All-Russian Cybersecurity Olympiad
26:48
Why does an IT manafer need soft skills?
17:22
Hooks and Rods
18:35
Quiz "Moscow in numbers"
19:13
Top 5 cheating schemes
21:16
Countering cyberbullying and involvement in droppery
55:14
Roundtable on the use of InnerSource approaches in Python development
49:36
Challenges of typing in Python
49:02
Anomaly detection using Python: from theory to practice
24:05
Battle of architectural approaches
01:05:39
From desktop to browser: crafting browser-native game engine with WASM
52:50
About strings in Python and beyond
21:01
The battle of DI frameworks
56:46
Asynchronous vs threads: who will survive in the NoGIL era?
24:02
Battle of web frameworks
41:51
Secure access to information in isolated networks
53:17
Bug bounty: international experience, business value, and prospects
01:05:55
Requesting the court to consider.
50:57
Cybersecurity in court: bridging the gap between lawyers and tech experts
34:52
Myths and realities of the virtualization platform market and their protection
41:51
Resource isolation mechanisms in "clouds" using the example of K2 Cloud
44:17
Let's live in harmony
33:16
Multi-tenant Kubernetes. Network isolation. The Experience of Alfa-Bank
42:47
ArchOps: the architectural oversight process at Positive Technologies
50:54
StaaS (Stand as a Service)
21:40
How IT solutions transform the quality of life for ordinary Muscovites
11:23
Monitoring and managing decentralized retail network objects
12:33
Fake it or make it: justifying infrastructure costs
12:17
Windows inventory via SSH
13:31
Meta-skills for job seekers and their employers
14:07
Deployment automation: how to simplify complexity with a single button
09:29
Award Ceremony Marking the Third Anniversary of the Standoff Bug Bounty Platform
55:53
SDRcraft: the art of electronic warfare
49:15
Ensuring data privacy in the development of ML models
45:36
802.11 + Linux: under the hood
45:32
How to start a zoo of digital beasts for health and safely maintain them with AI
43:10
How to reach an agreement with everyone in the company, even if you are the tough security guy?
30:56
From Reactive to Preventive: How Antivirus Enhanced MaxPatrol EDR Capabilities
52:38
How to optimize databases: 10 tips for developers
46:59
PhantomCore: activity chronicle and tool evolution
49:55
Sysinternals through the eyes of SOC
54:27
Caching patterns in large and high-load systems
50:27
How to safely code in C in 2025
58:47
Open source from crystal to software stack
56:35
The evolution of memory models
55:28
Don't underestimate nanoseconds: the art of writing efficient code
51:49
The developer-warrior: exponential reflection