Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
4,120 results
A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...
1,292,742 views
3 years ago
Why did OpenAI's board go insane a couple of weeks ago and fire and then immediately rehire Sam Altman? We dive into the ...
7,293 views
6 months ago
https://gist.github.com/kmicinski/3be14ef78f5326032ee4243941485b67.
5,932 views
Christopher Webber You may have heard of Stallman and the printer, but much of free software's genesis involves the battle over ...
6,549 views
6 years ago
Architect on the first ARM Processor at Acorn Computers in Cambridge in the early 1980s, Steve Furber together with Sophie ...
64,148 views
7 years ago
Your pentesting goal: getting the data. You decide to do it physically. How to go about? #PhysicalSecurity Walter Belgers.
58,213 views
*--* ---
9,421 views
9 years ago
A podcast(?) where veteran game developers Shawn McGrath (Dyad, N++) and Sean Barrett (Thief, System Shock 2) discuss ...
15,744 views
Standford University - 13 October 2014 Today, the Global Positioning System (GPS) is deployed in over three billion devices ...
45,194 views
Entropy, the randomness used in many critical cryptography processes including key generation, is as important as it is ...
1,364 views
8 years ago
Im Rahmen von ReclaimYourFace, einer Initiative gegen biometrische Überwachung, haben wir über fragdenstaat.de eine ganze ...
830 views
2 years ago
BOB 2017 keynote: http://bobkonf.de/2017/keynote.html.
1,024 views
Ian Goldberg -Using the Internet Pseudonymously: One Year Later Last year we told you about the plans for the Freedom network ...
959 views
10 years ago
5,101 views
A comedy set analysing the technology and interfaces shown in movies and explaining, using research, why they are all suck.
1,925 views
Low-Level Software Security: Attacks and Countermeasures, by Frank Piessens This module introduces common low-level ...
5,010 views
Not Sponsored* Next up in the Knowledge Graph Technology Showcase is TerminusDB, a git-like tool for managing and reusing ...
402 views
Core Tor developer Isis Agora Lovecruft lectures on designs for anonymous communications networks to graduate students in the ...
32,684 views
AES - The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...
65,103 views
5 years ago
Antonio Faonio and Daniele Venturi. Talk at Asiacrypt 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27889.
151 views