Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
790 results
A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...
1,291,806 views
3 years ago
A video of Conway's Game of Life, emulated in Conway's Game of Life. The Life pattern is the OTCA Metapixel: ...
3,797,458 views
12 years ago
Why did OpenAI's board go insane a couple of weeks ago and fire and then immediately rehire Sam Altman? We dive into the ...
7,292 views
6 months ago
No one on Earth knows how to reverse one of the most popular computer algorithms. Yet it's really easy to compute one-way.
2,487,860 views
4 years ago
Learn how the most important component in your device works, right here! Author's Website: http://www.buthowdoitknow.com/ See ...
8,234,027 views
11 years ago
Edward Kmett is the chairman of the Haskell Libraries Committee. In this interview he shares the benefits of the Haskell functional ...
17,070 views
2 years ago
0:00 Intro 0:30 Quick demo 0:53 Theory 2:23 Elon Musk appearance :) 2:58 Visual SLAM with ORB-SLAM2 5:11 Hector SLAM ...
54,581 views
Just something I've been thinking about for a while. How to Know if you have ADHD ...
940,245 views
7 years ago
What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...
386,849 views
5 years ago
Writing a gameboy emulator is probably the most rewarding hobbyist project I've ever embarked on. Not only is the process ...
2,270 views
1 year ago
In this activity you will learn the benefits of SSH, Secure shell, versus plain FTP.
35,147 views
8 years ago
Aaron Hsu explains what the APL programming language offers and outlines some of its key benefits. APL is a high productivity ...
3,278 views
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers MICHAEL SCHRENK This is the true ...
3,413 views
10 years ago
Abusing NoSQL Databases Ming Chow Lecturer, Tufts University Department of Computer Science The days of selecting from a ...
6,740 views
Using simple materials and a map of the world, you can demonstrate how GPS determines a location. For a full description of this ...
31,739 views
Apple and Google's Bluetooth-based app would reportedly be voluntary and anonymous. Privacy advocates say we should ...
16,883 views
A hacker is a person who exhibits playfulness and cleverness, and explores the limits of what is possible. A short collection of ...
167 views
Chapters: 00:00 - Intro & Motivation 00:57 - Concept #1: CPU Caches 01:57 - Measure Cache Access Time with rdtscp 05:00 ...
121,204 views
This tutorial shows how an attacker can perform a Replay attack on the Internet. Replay is an attack in which data is maliciously ...
13,386 views
The development of this video series was supported by grants from the Slovenian Research Agency (including P2-0209, V2-2274, ...
2,695 views
10 months ago