Похожие видео
array(10) {
[0]=>
object(stdClass)#4486 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "F8NKVhkZZWI"
["related_video_title"]=>
string(19) "What are AI Agents?"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
string(14) "IBM Technology"
}
[1]=>
object(stdClass)#4459 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "WUD1RLSd3U0"
["related_video_title"]=>
string(55) "Next.js Server Component role base access with Supabase"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(16) "Daily Web Coding"
}
[2]=>
object(stdClass)#4484 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "5GG-VUvruzE"
["related_video_title"]=>
string(43) "How To Handle Permissions Like A Senior Dev"
["posted_time"]=>
string(27) "7 месяцев назад"
["channelName"]=>
string(18) "Web Dev Simplified"
}
[3]=>
object(stdClass)#4491 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "n2eT3JRGAM4"
["related_video_title"]=>
string(35) "Risk-Based Authentication Explained"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
string(14) "IBM Technology"
}
[4]=>
object(stdClass)#4470 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "jrHRe9lSqqA"
["related_video_title"]=>
string(34) "What Is a Prompt Injection Attack?"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(14) "IBM Technology"
}
[5]=>
object(stdClass)#4488 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "IbghSht_tpA"
["related_video_title"]=>
string(51) "Understanding Attribute Based Access Control (ABAC)"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(14) "All Things IAM"
}
[6]=>
object(stdClass)#4483 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7fkS-18KBlw"
["related_video_title"]=>
string(56) "Event-Driven Architecture (EDA) vs Request/Response (RR)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(9) "Confluent"
}
[7]=>
object(stdClass)#4493 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "4Uya_I_Oxjk"
["related_video_title"]=>
string(75) "Role-Based Access Control (RBAC) Explained: How it works and when to use it"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(10) "Erik Wilde"
}
[8]=>
object(stdClass)#4469 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(22) "13 дней назад"
["channelName"]=>
string(18) "Коллектив"
}
[9]=>
object(stdClass)#4487 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "enztHVaMiMc"
["related_video_title"]=>
string(42) "RBAC vs. ABAC vs. ReBAC in under 5 minutes"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(6) "Permit"
}
}
What are AI Agents?
Next.js Server Component role base access with Supabase
How To Handle Permissions Like A Senior Dev
Risk-Based Authentication Explained
What Is a Prompt Injection Attack?
Understanding Attribute Based Access Control (ABAC)
Event-Driven Architecture (EDA) vs Request/Response (RR)
Role-Based Access Control (RBAC) Explained: How it works and when to use it
Разведчик о том, как использовать людей
RBAC vs. ABAC vs. ReBAC in under 5 minutes