Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,513 results
Chapters: 00:00 - Intro & Motivation 00:57 - Concept #1: CPU Caches 01:57 - Measure Cache Access Time with rdtscp 05:00 ...
121,184 views
1 year ago
In this work, we present the novel results of our research on Intel CPU microcode. Building upon prior research on Intel Goldmont ...
6,177 views
9 months ago
View the full free MOOC at https://ost2.fyi/Vulns1002. This class is for C/C++ developers learning secure development, and ...
201 views
3 months ago
In Roon ROCK - Roon Core for the Intel NUC part 1 and 2 I have showed you how to prepare an Intel NUC computer for use with ...
31,847 views
6 years ago
A general introduction into using the Intel VTune Profiler to optimize parallel applications. This video is part of an #hpc.nrw tutorial ...
7,348 views
2 years ago
A deep dive into the Windows boot process, its security mechanisms, and the security issues that have been found within the last ...
2,130 views
Speculative Store Buffer Bypass is a security vulnerability that allows unauthorized users to steal sensitive information through ...
60,047 views
As an American, you can't help but root for Intel CEO Pat Gelsinger to succeed. His vision to bring semiconductor manufacturing ...
10,624 views
4 months ago
This is a follow-up to my popular Windows 11 video. I respond to several of the common comments and criticisms and give a lot ...
221,729 views
This video provides some context about CPU architecture concepts important in the work with the Intel VTune Profiler. It covers a ...
827 views
View the full free MOOC at https://ost2.fyi/Arch4001. This course will be an advanced Intel architecture and firmware security class ...
194 views
2 months ago
128 views
125 views
Unfortunately, security vulnerabilities in signed drivers can be used to as a proxy to read and write hardware resources such as ...
5,274 views
4 years ago
Two sets of security issues will be discussed: those that affect all NoSQL database systems such as defaults, authentication, ...
6,740 views
10 years ago
142 views
219 views
In the recent years, we have seen some of the major players in the industry switch from x86-based processors to ARM processors.
1,508 views
175 views
The presentation demonstrates that the security of the A5/1 and A5/3 ciphers used to protect cellular calls are vulnerable to ...
11,867 views