Похожие видео
array(10) {
[0]=>
object(stdClass)#5407 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "1ibeCQjjpBw"
["related_video_title"]=>
string(82) "Enhance Your Security Posture with Cloud Security Command Center (Cloud Next '19)"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(12) "Google Cloud"
}
[1]=>
object(stdClass)#5380 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "vTREgPtu8-k"
["related_video_title"]=>
string(54) "Identity Federation on Google Cloud with Goldman Sachs"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(12) "Google Cloud"
}
[2]=>
object(stdClass)#5405 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "5uNifnVlBy4"
["related_video_title"]=>
string(71) "Cybersecurity Architecture: Who Are You? Identity and Access Management"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(14) "IBM Technology"
}
[3]=>
object(stdClass)#5412 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "fI-5LkBDap8"
["related_video_title"]=>
string(88) "Scalable and Manageable: A Deep-Dive Into GKE Networking Best Practices (Cloud Next '19)"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(17) "Google Cloud Tech"
}
[4]=>
object(stdClass)#5391 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "MpUcyEZR8Tc"
["related_video_title"]=>
string(76) "Data protection and regulatory compliance with Google Cloud — Next '19"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(12) "Google Cloud"
}
[5]=>
object(stdClass)#5409 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "gNx2iMhOm7Q"
["related_video_title"]=>
string(41) "A Year in GCP Networking (Cloud Next '19)"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(17) "Google Cloud Tech"
}
[6]=>
object(stdClass)#5404 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "HUHBq_VGgFg"
["related_video_title"]=>
string(66) "Cloud Load Balancing Deep Dive and Best Practices (Cloud Next '19)"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(17) "Google Cloud Tech"
}
[7]=>
object(stdClass)#5414 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "r0bdcgEyxic"
["related_video_title"]=>
string(75) "Secure onboarding to Google Cloud with Identity and Access Management (IAM)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(12) "Google Cloud"
}
[8]=>
object(stdClass)#5390 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "jGO6QtWOPJQ"
["related_video_title"]=>
string(174) "КАСЬЯНОВ: "Я видел это своими глазами. Это не публиковалось": что показали Путину, чего он боится"
["posted_time"]=>
string(24) "13 часов назад"
["channelName"]=>
string(24) "И Грянул Грэм"
}
[9]=>
object(stdClass)#5408 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "a_xsKsBhKU4"
["related_video_title"]=>
string(99) "Mastering IAM Deny Policies in Google Cloud: Best Practices and Implementation Guide Solutions Talk"
["posted_time"]=>
string(19) "2 дня назад"
["channelName"]=>
string(12) "Google Cloud"
}
}
Enhance Your Security Posture with Cloud Security Command Center (Cloud Next '19)
Identity Federation on Google Cloud with Goldman Sachs
Cybersecurity Architecture: Who Are You? Identity and Access Management
Scalable and Manageable: A Deep-Dive Into GKE Networking Best Practices (Cloud Next '19)
Data protection and regulatory compliance with Google Cloud — Next '19
A Year in GCP Networking (Cloud Next '19)
Cloud Load Balancing Deep Dive and Best Practices (Cloud Next '19)
Secure onboarding to Google Cloud with Identity and Access Management (IAM)
КАСЬЯНОВ: "Я видел это своими глазами. Это не публиковалось": что показали Путину, чего он боится
Mastering IAM Deny Policies in Google Cloud: Best Practices and Implementation Guide Solutions Talk