Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
943 results
A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...
1,290,390 views
3 years ago
A video of Conway's Game of Life, emulated in Conway's Game of Life. The Life pattern is the OTCA Metapixel: ...
3,797,142 views
12 years ago
Why did OpenAI's board go insane a couple of weeks ago and fire and then immediately rehire Sam Altman? We dive into the ...
7,288 views
6 months ago
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers MICHAEL SCHRENK This is the true ...
3,412 views
10 years ago
Edward Kmett is the chairman of the Haskell Libraries Committee. In this interview he shares the benefits of the Haskell functional ...
17,054 views
2 years ago
Using simple materials and a map of the world, you can demonstrate how GPS determines a location. For a full description of this ...
31,726 views
This tutorial shows how an attacker can perform a Replay attack on the Internet. Replay is an attack in which data is maliciously ...
13,384 views
7 years ago
This lecture was recorded on April 5, 2012, in Hameetman Auditorium at Caltech, Pasadena, CA, USA.
474,090 views
Apple and Google's Bluetooth-based app would reportedly be voluntary and anonymous. Privacy advocates say we should ...
16,883 views
4 years ago
https://mitbitcoinexpo.org.
1,364 views
1 year ago
Aaron Hsu explains what the APL programming language offers and outlines some of its key benefits. APL is a high productivity ...
3,274 views
This diagram traces the calls that the computer makes while executing a recursive algorithm to calculate Fibonacci numbers for an ...
1,671 views
A hacker is a person who exhibits playfulness and cleverness, and explores the limits of what is possible. A short collection of ...
167 views
8 years ago
A short introduction to the core concepts of knowledge graphs and their use in biomedicine. The presentation provides a minimal ...
11,546 views
This video explains the positives and negatives of the coding language Snap! Use Snap! here: https://snap.berkeley.edu Who am I ...
3,379 views
Domain fronting, the technique of circumventing internet censorship and monitoring by obfuscating the domain of an HTTPS ...
15,697 views
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
35,146 views
18,734 views
Clickjacking changed the way we have to interact with content from other sites, such as "like" buttons, but could Intersection ...
38,352 views
5 years ago
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,693 views