Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
858,320 results
You can replace user computer with a new hardware without losing user data. Computer replacement process is very easy and ...
838 views
4 years ago
David Groff https://2016.pygotham.org/talks/336/algorithmically-generated-music-using-pyo-based-on-user-data At Peloton our ...
6,873 views
7 years ago
One of my favorite command line utilities is "awk" which is a text-processing program. It is mostly used for pattern scanning and ...
285,530 views
3 years ago
Credit : @HasGeekTV The video is uploaded here for educational purpose Like us on Facebook ...
133,567 views
2 years ago
Published on Jan 02 2020, Happy New Year 2020 to all my subscribers and viewers. ⭐ Kite is a free AI-powered coding assistant ...
20,018 views
Speaker: Pratap Kudupudi, Tech Lead Manager at Uber ...
92 views
Our 3rd Passion Projects talk, recorded live with Timoni West. Timoni is a Brooklyn-based designer currently working on UX at ...
5,105 views
11 years ago
Welcome, How to Store the Data in the Database using Express & Mongoose | Promises Version Check my Instagram to Chat ...
70,270 views
Data Access Monitoring Operator (DAMO): User-Space Tool/Python Library for Access-Aware Profiling and Optimization of Your ...
240 views
8 months ago
Today we are going to build a basic user management system using Node.js, Express, Express-Handlebars and MySQL. Source ...
162,757 views
This video is part of the virtual useR! 2020 conference. Find supplementary material on our website https://user2020.r-project.org/.
2,627 views
Speaker: Bhupendra Jain, Senior Staff Software Engineer at LinkedIn https://hasgeek.com/PrivacyMode/bpg.
110 views
Please subscribe to get more notifications of new videos upload. Thank you.
50,675 views
Schema mapping specification turns to be cumbersome for ordinary users who need to be acquainted with abstract mapping ...
81 views
Welcome, into the world of secure authentication with our latest tutorial! Learn how to implement JWT token verification ...
10,745 views
6 months ago
End-User Computing (EUC) is the realm of spreadsheets, word processing, presentations, email, stand-alone users, individual ...
1,250 views
8 years ago
Excel is one of the most used skills in the data world. In this series we will be walking through all of the most important topics that ...
484,761 views
Want to write p2p apps, without worrying about identity, storage, encryption or access control? We'll describe how to write an app ...
261 views
1 year ago
Power and Responsibility — Data Privacy and User Trust in Health-tech As health tech becomes smarter and more pervasive, ...
202 views
fs-verity: Native File-based Authenticity - Michael Halcrow & Eric Biggers, Google The Android platform uses dm-verity to protect ...
3,514 views
5 years ago