{"id":167,"date":"2019-02-11T15:18:01","date_gmt":"2019-02-11T15:18:01","guid":{"rendered":"http:\/\/dcnds.asia\/?page_id=167"},"modified":"2019-07-30T06:49:02","modified_gmt":"2019-07-30T06:49:02","slug":"videos-malaysia","status":"publish","type":"page","link":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/videos-malaysia\/","title":{"rendered":"[Series 1] Workshop videos in Malaysia"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/1UFXZi3figM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong> Introduction to Cloud Security&nbsp;<\/strong> (D1S1 at Malaysia)<br><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/JlszlQHLxHs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong>Cloud Security Issues<\/strong> (D1S2 at Malaysia)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/jML-0UOMWp8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong>FIWARE Cloud Arcitecture<\/strong> (D1S3 at Malaysia)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/tWtWL3ytNUI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong>FIWARE Application Development Overview<\/strong> (D1S4 at Malaysia)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/zUcp_tFJ7Ms?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong>FIWARE Application Hands On<\/strong> (D1S5 at Malaysia) <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/3HW95uvN-5s?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong>Cloud Enabled Security System (CESS)<\/strong> (D2S1 at Malaysia)  <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/2RG_BKUb63M?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong>Brief Overview on Securing OpenStack Cloud<\/strong> (D2S2 at Malaysia) <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" width=\"650\" height=\"366\" src=\"https:\/\/www.youtube.com\/embed\/meTUiZCzeQI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption><strong>Network Monitoring Tools and Security Analysis<\/strong> (D2S3 at Malaysia)   <\/figcaption><\/figure>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cloud Security&nbsp; (D1S1 at Malaysia) Cloud Security Issues (D1S2 at Malaysia) FIWARE Cloud Arcitecture (D1S3 at Malaysia) FIWARE Application Development Overview (D1S4 at Malaysia) FIWARE Application Hands On (D1S5 at Malaysia) Cloud Enabled Security System (CESS) (D2S1 at Malaysia) Brief Overview on Securing OpenStack Cloud (D2S2 at Malaysia) Network Monitoring Tools and Security Analysis (D2S3 at Malaysia)<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/167"}],"collection":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/comments?post=167"}],"version-history":[{"count":9,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/167\/revisions"}],"predecessor-version":[{"id":421,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/167\/revisions\/421"}],"wp:attachment":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/media?parent=167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}