Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
53 results
Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ...
81,949 views
9 months ago
I wish you all a wonderful day! Stay safe :) emacs shell.
27 views
6 months ago
It is 60 years since the first publication of the ASCII standard, something we now very much take for granted. ASCII introduced the ...
19,023 views
Terminals were the main user interface for interactive computing throughout the 1960s, 1970s, 1980s and into the 1990s.
1,314 views
The enshittification of the internet follows a predictable trajectory: first, platforms are good to their users; then they abuse their ...
248,880 views
Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...
114,163 views
Since starting the "Configuring Emacs" series, I've been getting some questions from viewers that are configuring Emacs and are ...
7,204 views
8 months ago
Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ...
82,677 views
The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ...
1,739 views
Speaker: Rex Jaeschke A formal specification for an IT project allows implementers to understand what is required to build an ...
669 views
10 months ago
https://bit.ly/3t29iTb.
80 views
Streamed 9 months ago
The use of containers became an integral part of any resource-efficient and secure environment. Starting from Windows Server ...
16,455 views
Session recordings from the 2023 PowerShell + DevOps Global Summit. Hosted at the Downtown Marriott Bellevue WA April ...
363 views
11 months ago
Building Knowledge Graphs - Sumit Pal, Ontotext Knowledge graphs are all around us and we are using them everyday. Lot of the ...
147 views
Andy Pavlo (https://www.cs.cmu.edu/~pavlo/) Slides: https://15445.courses.cs.cmu.edu/fall2023/slides/02-modernsql.pdf Notes: ...
23,112 views
BLE devices are now all the rage. What makes a purpose built tracking device like the AirTag all that different from the majority of ...
29,971 views
Our current administration lists "Defend Critical Infrastructure" as the #1 item in the 2023 National Cybersecurity Strategy.
1,707 views
Himanshu Yadav, Senior Principal Product Manager of Application Development, Red Hat Ganesh B. Nalawade, Senior Principal ...
380 views
5 months ago
Here are 40 terms and slang words that every electrical testing technician NEEDS TO KNOW. Here are some helpful links going ...
710 views
Existing packages are rebuilt but this time using shared libraries. This overwrites the existing statically-linked versions built at the ...
55 views