Cloud Computing Security Architecture | Lec-25 | Cloud Computing
Virtualization in cloud computing | Definition, Benefits and level of Virtualization | Lec-18
Data Centre Design and Interconnection Network in Cloud Computing | Lec-13
Cloud Migration strategy in hindi | Six R's of migration in cloud computing | Lec-6
What is Aneka and Aneka Architecture in cloud computing | Lec-34
🌟 CLOUD REFERENCE MODEL in cloud computing | Lec-12
Virtualization of CPU, Memory, Hardware and I/O Devices | Cloud Computing | Lec-20
Software as a service - SaaS | Cloud Computing Services | Cloud Computing | Lec-9
Virtualization of Server, Desktop and Networks in cloud computing | Lec-22
Architectural design of Compute and Storage Cloud | Cloud Computing | Lec-14
Service Level Agreement (SLA) in cloud computing | Lec-30
Understanding and Identification of Threats in cloud computing | Lec-31
Platform as a service - PaaS | Cloud Computing Services | Cloud Computing | Lec-8
What is CRM | Customer Relationship Management | Cloud Computing | Lec-35
Business continuity and Disaster Recovery Planning in Cloud Computing | Lec-28
Virtual Cluster and resource management in cloud computing | Lec-21
Challenges in Cloud computing in hindi | Cloud computing tutorial | Lec-4
Amazon Web Services | Amazon EC2, Amazon S3 in Cloud Computing | Lec-32
Iaas, Paas and Saas Differences in Cloud Computing | Cloud Computing Services | Lec-10
IaaS - Infrastructure as a Service | Cloud Service Models | Cloud Computing tutorial | Lec- 7
What is Hypervisor / VMM in cloud computing | VMware and Xen | Types of Hypervisor | Lec-19
Parallel and Distributed programming paradigms MapReduce, Hadoop in cloud computing | Lec-15
Cloud Security Design Principles in cloud computing | Cloud Security Challenges | Lec-24
Programming of Google App Engine in cloud computing | Google App Engine | Lec-16
Cloud Programming and Software in cloud computing | Lec-17
Risk Mitigation in cloud computing | Lec-29
Cloud Information Security Fundamentals | Cloud Security Services | Lec-23
Cloud Deployment Models in cloud computing | Public, private, hybrid cloud in hindi | Lec-11
Legal Issues in cloud computing | Lec-27 | Cloud Computing
Threads in Operating System in hindi | Threads and Multithreading in operating system | Lec-10
Free Space Propagation Model in Wireless Communication
Security Policies for Cloud computing | Lec-26
Introduction to soft computing | Aims of soft computing | Soft computing vs Hard computing
FDMA, TDMA, CDMA and SDMA in one video 🔥 | Wireless Communication
PAPR - Peak to Average Power Ratio and Windowing in wireless communication
QPSK and Offset QPSK in wireless Communication | Complete Video ✅
pi/4 DQPSK in wireless communication | π/4 QPSK full video ✅
Process Synchronization in Operating System | Process types | Operating System | Lec-27
Spatial Multiplexing and Spatial Diversity | Wireless Communication
Three address code in compiler design | Quadruple, Triple and indirect triple | Lec-19
OFDM in wireless communication | Orthogonal Frequency Division Multiplexing
Principal Component Analysis ( PCA) in machine learning | Lec-27
NFV in IoT | Key elements of NFV | IOT tutorial | Lec-9 | Network function virtualization
Introduction to Big Data Analytics | Tools, features, uses and examples of BDA | Big Data Analytics
IOT Communication APIs | REST and Web Socket IoT APIs | Lec-4 | IOT playlist
5 Ways to improve Wireless Communication Capacity and Coverage
Objective and Scope of Wireless Communication | Wireless Communication tutorials
Channel Assignment Strategy - Fixed, Dynamic, Hybrid Channel Assignment
Two Ray Models in wireless communication
Clustering and type of clustering in machine learning | Lec-19 | Er Sahil ka Gyan
What is Cloud Computing in hindi | Introduction to Cloud Computing | Lec-1
Characteristics of cloud computing in hindi | Cloud computing tutorial | Lec-2
Risk and Challenges of Cloud Migration in hindi | Cloud Migration | Lec-5 | Cloud Computing
Components of cloud computing in hindi | Cloud Computing tutorial | Lec-3
Microsoft Azure in cloud computing | Cloud Platform | Lec-33
Three layer and five layer architecture of IoT | IoT tutorial | Lec-30
K means clustering with an example in machine learning in hindi | Lec-20
Deadlock detection and Deadlock Recovery in operating system | Lec-37
Scheduling Criteria in operating system | Waiting time, arrival time, burst, turnaround time| Lec-18
Parameters of Mobile Multipath Channels | Wireless Communication