Google Cloud Platform1.17 млн
Следующее
Опубликовано 5 ноября 2021, 16:35
Watch this demonstration on how to create a secure pipeline, from source to production. Learn how to apply vulnerability scanning, code signing, attestations, and policy-driven admission controls. Use these applications on Cloud Build, Artifact Registery, and Artifact Analysis to deploy to targets like Cloud Run and Google Kubernetes Engine.
Resources:
Visit the Next '21 website → goo.gle/3i2ayO2
Speakers:
Christopher Sanson , Anthony Bushong
Watch more:
All sessions from Google Cloud Next → goo.gle/next21-allsessions
All the sessions from Google Cloud Tech → goo.gle/next21-googlecloudtech
Watch all the Application Development sessions → goo.gle/next21-applicationdev
Subscribe to Google Cloud Tech → goo.gle/GoogleCloudTech
#GoogleCloudNext
DEV301
product: Cloud - Containers - Cloud Build, Cloud - Developer Tools - Artifact Registry, Cloud - Security and Identity - Policy Intelligence; event: Google Cloud Next 2021; fullname: Christopher Sanson, Anthony Bushong; re_ty: Publish;
Resources:
Visit the Next '21 website → goo.gle/3i2ayO2
Speakers:
Christopher Sanson , Anthony Bushong
Watch more:
All sessions from Google Cloud Next → goo.gle/next21-allsessions
All the sessions from Google Cloud Tech → goo.gle/next21-googlecloudtech
Watch all the Application Development sessions → goo.gle/next21-applicationdev
Subscribe to Google Cloud Tech → goo.gle/GoogleCloudTech
#GoogleCloudNext
DEV301
product: Cloud - Containers - Cloud Build, Cloud - Developer Tools - Artifact Registry, Cloud - Security and Identity - Policy Intelligence; event: Google Cloud Next 2021; fullname: Christopher Sanson, Anthony Bushong; re_ty: Publish;
Свежие видео
Случайные видео