Cloud Computing - Database Introduction

Sdílet
Vložit

Komentáře • 13

  • @casamir1
    @casamir1 Před 4 lety +11

    The 2 minute disclaimer at the start of the video is how you know Eli has been in the CZcams game for a long time.

  • @frequencyio
    @frequencyio Před 4 lety +2

    I love how you beat our brains to a pulp every time... 👍🏾

  • @blueberrypuffin9921
    @blueberrypuffin9921 Před 4 lety +2

    Looking forward to more database focused videos. Thanks Eli!

  • @franklindelacruz4376
    @franklindelacruz4376 Před 4 lety +2

    Awesome video Eli! Thanks

  • @brandonfarfan1978
    @brandonfarfan1978 Před 4 lety +1

    Super informative lesson. I learned alot from this vid.

  • @fabricioroque7076
    @fabricioroque7076 Před 4 lety +1

    THANKS ELI GOOD VIDEO

  • @AmmuAmmu-xd8ix
    @AmmuAmmu-xd8ix Před 4 lety

    Could you explain in the topic" federated learning in mobile edge network"

  • @krishanusingh1608
    @krishanusingh1608 Před 4 lety

    hey eli can you please guide me to some more involved documentation and resources on Paas Databases platforms. Thanks.

  • @lgrfbs
    @lgrfbs Před 4 lety +2

    This will bee fun.

  • @GoldenSheenObsidan
    @GoldenSheenObsidan Před 2 lety

    Do our databases collect past information of those who planted things into our software?
    If so, are we able to tell(identify) who they are due to some who decided to misuse it as a way to harass and stalk and harm others as well as their loved ones databases too?
    We have a right to identify those who mistreated others as well as try to change them in a way that harmed psychologically and caused physical attacks against innocent bystanders & we have right to protect ourselves through our data from others attacking our families as well as others.
    Another thing is are they able to switch other people’s database that mixed with others if so, how do we separate our database from those who do not fit our mindsets in their levels of thinking?
    Why do they harass people with their thoughts and how are businesses managing this in their systems to harass and stalk others and attack them Ina sense, technically physically and mentally as it is damaging towards their former workers or opponents as well as trying to make them look bad in any kind of way and then legally claiming others databases and changing their behaviors to gain more out of their business but in a bad kind of way causing destructive behaviors among others to impose onto those who they choose to attack?
    How are they using illusions to destroy a persons life or heal as a reward if they comply to someone else’s data base in order to stalk and harass their victims and distort their info. by abuse attacking them spiritually mentally & possibly to the point where they cause bodily harm against others by creating these dangerous illusions into their actual minds from their device in order to replicate suicidal tendencies among others and others mentally unstable issues by harming people?
    How do we make it stop and how are we to protect ourselves from issues like these from others who try to change something they were never supposed to use it as and how is it that they are showing certain thumbnails showing up on my feed and then quickly taking it down in order to communicate a certain disturbing deciphered message as a way to harass me constantly?

  • @robinr2336
    @robinr2336 Před 4 lety +1

    👍👍

  • @fluffio2976
    @fluffio2976 Před 4 lety

    Is games of thrones still a thing?

  • @user-bm7bd8xh7z
    @user-bm7bd8xh7z Před 4 lety

    Johnny sins lol