Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
56,977 results
In this stream, we start implementing the concurrency algorithm from the academic paper "A Practical Wait-Free Simulation for ...
44,449 views
3 years ago
0:00 introduction 0:27 unboxing 1:18 what is a smart lock 2:12 is a smart lock safe? 3:36 what if your smartphone is out of battery?
31,988 views
1 year ago
In this stream, we continue implementing the concurrency algorithm from the academic paper "A Practical Wait-Free Simulation for ...
11,708 views
0:00 intro 0:16 unboxing 4:44 manual overview 5:17 preparing the smartlock for installation 7:16 touch ID speed test 7:27 register ...
1,610 views
A recent trend in high security locks is to add a moving element to the key: this prevents casting, 3D printing and many other forms ...
35,360 views
In this day and age, all sites should be using HTTPS to protect their users' privacy and security. Fortunately, Chrome is here to ...
19,186 views
8 years ago
Here are the 20 things that every 6th Generation Honda Goldwing owner should know. CHAPTER GUIDE: 00:00 - Beginning ...
158,965 views
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock DAVID LAWRENCE STUDENT, ...
2,565 views
10 years ago
Efficient Userspace Optimistic Spinning Locks Speaker Mr Waiman Long (Red Hat) Description The most commonly used simple ...
888 views
4 years ago
As our homes become smarter and more connected we come up with new ways of reasoning about our privacy and security.
64,954 views
7 years ago
What does GIL really guarantee you? by Daniel Vartanov You probably heard that Global Interpreter Lock (GIL) in Ruby "allows ...
2,676 views
6 years ago
Let's talk about how Python 3.13 will transform the way people use the programming language. Experimental support for free ...
10,240 views
5 months ago
0:00:00 Introduction 0:10:15 How evmap works 0:42:56 The change 0:53:58 Reorganizing the code 0:58:46 Stripping out the ...
37,737 views
Recorded: Wednesday, June 15, 2016 Have you ever been offered a firearm for your collection? Have you been unsure how to ...
123 views
Paul addresses the problems connected with marriage, divorce, and remarriage. (I Corinthians 7:1-40) Subscribe to BibleTalk.tv: ...
24,632 views
What If... ?: Ruby 3 by Eric Weinstein What if Professor X and Magneto formed the X-Men together? What if Jessica Jones had ...
1,948 views
Kerr lens Modelocking for femtosecond pulses.
4,114 views
HTTPS is not only baseline security on the web, but also benefits site business by unlocking powerful capabilities and ...
140,458 views
In this episode of Crust of Rust, we go over Rust's atomic types, including the mysterious Ordering enum. In particular, we explore ...
79,887 views
How does Bundler work, anyway? by Andre Arko We all use Bundler at some point, and most of us use it every day. But what does ...
5,540 views