Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
223 results
A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...
1,300,343 views
3 years ago
Why did OpenAI's board go insane a couple of weeks ago and fire and then immediately rehire Sam Altman? We dive into the ...
7,326 views
7 months ago
Since its first appearance in Kernel 3.18, eBPF (Extended Berkley Packet Filter) has progressively become a key technology for ...
3,785 views
2 years ago
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers MICHAEL SCHRENK This is the true ...
3,416 views
10 years ago
https://mitbitcoinexpo.org.
1,369 views
1 year ago
Talk presented October 8, 2014 as part of the John von Neumann Public Lecture series at the Center for Complexity and ...
4,683 views
9 years ago
Fast Forensics Using Simple Statistics and Cool Tools JOHN ORTIZ COMPUTER ENGINEER, CRUCIAL SECURITY/HARRIS ...
3,573 views
Incorporating natural elements, complex fabrication techniques, and components rarely seen by the outside world, the DEF CON ...
18,268 views
4 years ago
Abusing NoSQL Databases Ming Chow Lecturer, Tufts University Department of Computer Science The days of selecting from a ...
6,743 views
UPDATE: Martijn van Beurden, one of the two authors of the IETF FLAC spec, has left a comment with some corrections and ...
4,668 views
Learn how the most important component in your device works, right here! Author's Website: http://www.buthowdoitknow.com/ See ...
8,238,188 views
11 years ago
In this talk, Andreas outlines the future micropayment ecosystem, how the fee market works, and why the simple / obvious solution ...
73,300 views
6 years ago
How to use CSP to stop XSS KENNETH LEE PRODUCT SECURITY ENGINEER, ETSY INC. Crosssite scripting attacks have ...
1,263 views
The transition from mostly 2D games into immersive 3D environments was brought on by none other than the original Quake, ...
74,999 views
In this talk, Andreas explores the rise of the term "blockchain" as a counterweight to bitcoin. The term blockchain does not provide ...
81,245 views
8 years ago
http://www.weforum.org/
18,148 views
Streamed 5 years ago
Post-conference recording of the keynote for May 11 at the Knowledge Graph Conference 2023 in New York, NY. How do ...
34,789 views
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,696 views
ACL Steganography - Permissions to Hide Your Porn MICHAEL PERKLIN SECURITY RESEARCHER Everyone's heard the ...
5,334 views
We cover topics such as how to: - Build and train deep learning, random forest, and regression models - Deploy models - Apply ...
329,424 views