Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
53 results
Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ...
82,070 views
9 months ago
I wish you all a wonderful day! Stay safe :) emacs shell.
27 views
6 months ago
It is 60 years since the first publication of the ASCII standard, something we now very much take for granted. ASCII introduced the ...
19,060 views
Terminals were the main user interface for interactive computing throughout the 1960s, 1970s, 1980s and into the 1990s.
1,314 views
The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ...
1,743 views
The enshittification of the internet follows a predictable trajectory: first, platforms are good to their users; then they abuse their ...
249,136 views
Since starting the "Configuring Emacs" series, I've been getting some questions from viewers that are configuring Emacs and are ...
7,210 views
8 months ago
Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...
114,216 views
Speaker: Rex Jaeschke A formal specification for an IT project allows implementers to understand what is required to build an ...
669 views
10 months ago
Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ...
82,744 views
This LF Energy webinar took place June 20, 2024. It featured: -Alex Thornton, LF Energy -Hallie Cramer, Google -Daniel Roesler, ...
54 views
4 days ago
Session recordings from the 2023 PowerShell + DevOps Global Summit. Hosted at the Downtown Marriott Bellevue WA April ...
364 views
11 months ago
Building Knowledge Graphs - Sumit Pal, Ontotext Knowledge graphs are all around us and we are using them everyday. Lot of the ...
149 views
https://bit.ly/3t29iTb.
80 views
Streamed 9 months ago
Our current administration lists "Defend Critical Infrastructure" as the #1 item in the 2023 National Cybersecurity Strategy.
1,713 views
Himanshu Yadav, Senior Principal Product Manager of Application Development, Red Hat Ganesh B. Nalawade, Senior Principal ...
382 views
5 months ago
BLE devices are now all the rage. What makes a purpose built tracking device like the AirTag all that different from the majority of ...
29,994 views
Here are 40 terms and slang words that every electrical testing technician NEEDS TO KNOW. Here are some helpful links going ...
717 views
Andy Pavlo (https://www.cs.cmu.edu/~pavlo/) Slides: https://15445.courses.cs.cmu.edu/fall2023/slides/02-modernsql.pdf Notes: ...
23,285 views
Existing packages are rebuilt but this time using shared libraries. This overwrites the existing statically-linked versions built at the ...
55 views