Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
167 results
With complete access to a system, Linux kernel rootkits are perfectly placed to hide malicious access and activity. However ...
4,612 views
2 years ago
We're constantly under attack, you could say. Our minds are being fished. We're like fish, that the bait's coming out at us, the ...
263 views
See how beams bend (learn about the "kinematics" of beam bending). You might also like our Beam Bending Playlist at ...
70,856 views
9 years ago
Virtual Reality by Prof Steven LaValle, Visiting Professor, IITM, UIUC. For more details on NPTEL visit http://nptel.ac.in.
1,469 views
8 years ago
We'll teach you: * How to open your photo in our powerful VR editor * Where to add 3D models to your scene * How to illuminate ...
4,868 views
7 years ago
Honoring the term, the variety of technologies in the Big Data stack is hugely BIG. Many complex components in charge of ...
4,084 views
This talk will cover the unique threats and challenges of working in information security for a news organization. Some best ...
4,531 views
Think of a random number between '0' and infinity. Was your number '0'? Seriously? Crap. Well unfortunately, the hardware ...
7,246 views
You've seen plenty of talks on exploiting, escalating, and exfiltrating the magical world of Google Cloud (GCP), but what about its ...
6,973 views
Modern programming languages are, more and more, being designed not just around performance, ease-of-use, and ...
2,164 views
Due to the well-known vulnerabilities in traditional authentication methods through users, passwords and tokens; biometric ...
7,404 views
3 years ago
What are the threats and vulnerabilities of a retail central bank digital currency (CBDC)? The central bank of Sweden has built a ...
1,618 views
Decades ago, breaking the sound barrier was a huge deal in transportation science... but many didn't think it could be done.
149,128 views
4,002 views
2,609 views
... bubble,warp bubble explained,real warp bubble,new warp bubble creation,insane comeback,reality warp bubble,warp bubble ...
9,693 views
1 year ago
With attacks moving below the operating system and computer firmware vulnerability discovery on the rise, the need to keep ...
2,350 views
This SCP reading video is about SCP 3130, an anomalous humanoid with 2 bodyguards who can bend reality to her will, and ...
5,657 views
You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...
2,051 views
Yuta Kageyama, Daisuke Iwai, and Kosuke Sato. "Online Projector Deblurring Using a Convolutional Neural Network.
238 views