Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Training (916 results) showing 121 - 130



Hands-on introduction to Kubernetes This training is the perfect starting point for your Kubernetes journey. First, you will get a compact introduction to the basic architecture and building blocks of Kubernetes. Building on that theoretical foundation, we will guide you through the process of...


This workshop caters to all Databricks users and developers, who want to increase their knowledge and hands-on experience with Delta Live Tables. We provide a mix of theory and practical application, tips and advice as well as a Q&A. Provided by our resident Databricks trainer with 2 hands-on...


In this course, each module presents a scenario with an architectural challenge to be solved. You will examine available AWS services and features as solutions to the problem. You will gain insights by participating in problem-based discussions and learning about the AWS services that you could...


This session offers a thorough walkthrough of MongoDB as used within Alteryx Server, from backup strategies to schema comprehension and connection protocols. Gain practical skills with a hands-on Alteryx Designer exercise to practice querying, ensuring you can manage and retrieve data effectively...


Introduction: Welcome to the pivotal Discovery stage of our Analytics & AI Advisory service, where we set the foundations for a transformative AI journey. At this juncture, we delve into the heart of your organization’s technological, data, and human capabilities, charting a strategic path forward...


PartnerAlly specializes in delivering services that drive accelerated partnership success through a comprehensive approach. We focus on implementing an Integrated Partner Learning and Relationship Management System, ensuring the seamless integration of partners into your ecosystem. This system...


Benefits to the Identity Workshop • Improve security, leading to a reduction in phishing and passwords attacks. • Enable convenience and improve user experience by allowing users to easily login and access data from anywhere. • Managed at scale to allow for single sign-in, MFA management, and...