Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
62 results
If you have an on-premises Active Directory environment, you do not want to miss this session! The AD product group will present ...
4,259 views
Streamed 2 months ago
Building Hard Real-Time Linux Systems with Xenomai - Jan Kiszka, Siemens It's 2023, and the whole real-time Linux world is ...
1,148 views
6 months ago
As the security landscape evolves, Windows to must change to protect users and organizations. Foundational to this is user ...
2,655 views
Firmware and software binaries are littered with private keys, legitimate CA-blessed certificates, and encryption keys—but hardly ...
49,736 views
9 months ago
Chapters: 00:00 Quickweb recap 04:02 Feature 1: QuickLook 09:15 QuickLook under the hood 15:30 What's an EFI application?
113,499 views
2 months ago
Userspace in Zephyr: Overview and Practicality - Daniel Leung, Intel Corporation This talk gives an overview on userspace in ...
86 views
1 month ago
This discussion with Amanda Berlin, Lead Instant Detection Engineer at Blumira. The focus of the conversation is on utilizing ...
9,064 views
5 months ago
Radical changes are coming to the Server Message Block (SMB) and file services in Windows Server 2025 and Windows 11.
2,006 views
Listen I changed my mind on the title after I rendered it, "Li'l" seemed like a good idea at the time. Future episodes will also have ...
116,041 views
3 months ago
Lecture 37 : Backstepping method for control design: Part 4.
103 views
Enhancing OCPP with E2E-Security and Binary Data Streams for a more Secure Energy Ecosystem was presented by Achim ...
63 views
4 months ago
As you move modern applications from development to production, it often makes sense to have multiple fit-for-purpose ...
1,635 views
11 months ago
Vehicles are undergoing a period of massive evolution driven by increased levels of autonomy, new in-car experience and ...
913 views
7 months ago
In part 23 of the series, we patch our cluster while the workload is running. We explain the different patch options and show how to ...
172 views
10 months ago
With Identity Threat Detection and Response (ITDR) continuing to trend in the realm of identity security, systems protecting Active ...
431 views
I ACTUALLY REPLY TO MY SUBSCRIBERS!!!! Unlike Other People... ☆PLAYLISTS☆ *Copyright Disclaimer Under Section 107 ...
24,309 views
Called OTP which is going to serve as basically the config file if you will for this whole system so this has a couple things one it ...
1,192 views
Streamed 10 months ago
AO.Space: An Open Source Solution for Personal Data Ownership - Wang Jianmin, Institute of Software Chinese Academy of ...
47 views
8 months ago
Shield Your Devices: The Strength of Open-Source Software and Hardware - Marouene Boubakri, NXP The RISC-V software ...
137 views
What is the solution Secure Data Facilities could offer to enable reproducibility for papers based on personal and confidential data ...
40 views