Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
446 results
We are moving rapidly toward quantum computing. How does the technology work and what does it mean for our future? Scientist ...
1,932,283 views
7 years ago
No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.
2,487,860 views
4 years ago
Episode 1 of the deep-dive series into FLAC, digital audio and its lossless compression. Manim source code for the series: ...
9,774 views
2 years ago
EDIT: At 00:12, the chip that is circled is not actually the CPU on this motherboard. This is an older motherboard where the CPU ...
2,137,422 views
12 years ago
Experienced coders can sometimes tell bad code on sight, not from any aspect of its inherent functionality, but from largely ...
3,643 views
Stay in the loop! https://discord.gg/nbyZ6EpUum https://twitter.com/jonathandinu https://jonathandinu.com ...
9,557 views
3 years ago
Reason is the planet's leading source of news, politics, and culture from a libertarian perspective. Go to reason.com for a point of ...
29,063 views
0:00 Intro 0:30 Quick demo 0:53 Theory 2:23 Elon Musk appearance :) 2:58 Visual SLAM with ORB-SLAM2 5:11 Hector SLAM ...
54,581 views
Just something I've been thinking about for a while. How to Know if you have ADHD ...
940,245 views
Writing a gameboy emulator is probably the most rewarding hobbyist project I've ever embarked on. Not only is the process ...
2,272 views
1 year ago
What are the risks of artificial intelligence dangerous, and how do we develop ethical, safe and beneficial AI? This was produced ...
68,816 views
6 years ago
Become a developer of Google's Carbon programming language in under 10 minutes! Learn by creating basic projects such as a ...
13,731 views
Have you considered that in certain situations the way hackers exploit vulnerabilities over the network can be predictable?
2,132 views
You can watch this class without ads and with quizzes and lab setup instructions by going to https://ost2.fyi/Arch2001.
599 views
What is a private key? How are they generated and formatted? Are private keys transmitted when you make a transaction?
42,980 views
5 years ago
Apple and Google's Bluetooth-based app would reportedly be voluntary and anonymous. Privacy advocates say we should ...
16,883 views
The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is ...
5,342 views
In this video we learn about path finding algorithms, like shortest path, single source shortest path, and all pairs shortest path.
9,512 views
Using simple materials and a map of the world, you can demonstrate how GPS determines a location. For a full description of this ...
31,737 views
The development of this video series was supported by grants from the Slovenian Research Agency (including P2-0209, V2-2274, ...
2,695 views
10 months ago