Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
290 results
A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...
1,288,922 views
3 years ago
Why did OpenAI's board go insane a couple of weeks ago and fire and then immediately rehire Sam Altman? We dive into the ...
7,287 views
6 months ago
What is the largest factor that makes GPUs tick, besides the core clock? It's the memory, which can cause a GPU pipeline to flow ...
8,877 views
2 years ago
Since its first appearance in Kernel 3.18, eBPF (Extended Berkley Packet Filter) has progressively become a key technology for ...
3,772 views
The core of the approach is to use the AI for inspiration, instead of having it write content for you. The "Idea generation" app in ...
789,619 views
8 months ago
Intro: I have given a talk with this title many times, and it turns out from discussions after the talk I could have just as well have ...
239,124 views
11 years ago
UPDATE: Martijn van Beurden, one of the two authors of the IETF FLAC spec, has left a comment with some corrections and ...
4,553 views
1 year ago
Learn how the most important component in your device works, right here! Author's Website: http://www.buthowdoitknow.com/ See ...
8,232,439 views
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers MICHAEL SCHRENK This is the true ...
3,412 views
10 years ago
Incorporating natural elements, complex fabrication techniques, and components rarely seen by the outside world, the DEF CON ...
18,248 views
4 years ago
Fast Forensics Using Simple Statistics and Cool Tools JOHN ORTIZ COMPUTER ENGINEER, CRUCIAL SECURITY/HARRIS ...
3,573 views
Chapters: 00:00 - Intro & Motivation 00:57 - Concept #1: CPU Caches 01:57 - Measure Cache Access Time with rdtscp 05:00 ...
121,187 views
Satellite designs are myriad as stars in the sky, but one common denominator across all modern missions is their dependency on ...
12,201 views
Abusing NoSQL Databases Ming Chow Lecturer, Tufts University Department of Computer Science The days of selecting from a ...
6,740 views
We cover topics such as how to: - Build and train deep learning, random forest, and regression models - Deploy models - Apply ...
325,467 views
With how many apps are running in the cloud, hacking these instances becomes easier with a simple vulnerability due to an ...
12,973 views
Help us caption & translate this video! https://amara.org/v/C1Efc/
380,557 views
00:00 Introduction and survey 01:36 "Lesson 0" How to fast.ai 02:25 How to do a fastai lesson 04:28 How to not self-study 05:28 ...
103,443 views
The internet is still largely centralized, and not every country has strong institutional controls preserving the right to access ...
2,088 views
9 months ago
How to use CSP to stop XSS KENNETH LEE PRODUCT SECURITY ENGINEER, ETSY INC. Crosssite scripting attacks have ...
1,262 views