ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

133 results

Improbable Matter
How a Computer Works - from silicon to apps

A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...

42:32
How a Computer Works - from silicon to apps

1,932,401 views

5 years ago

Jon Gjengset
Crust of Rust: Lifetime Annotations

In the 2019 Rust Survey, a lot of people were asking for video content covering intermediate Rust content. So in this first video ...

1:33:23
Crust of Rust: Lifetime Annotations

265,864 views

5 years ago

Jon Gjengset
Solving distributed systems challenges in Rust

In this stream we work through the fly.io distributed systems challenges (https://fly.io/dist-sys/) in Rust, and solve all the way up to ...

3:15:52
Solving distributed systems challenges in Rust

306,093 views

2 years ago

Confreaks
RubyConf 2016 - Computer Science: The Good Parts by Jeffrey Cohen

RubyConf 2016 - Computer Science: The Good Parts by Jeffrey Cohen You don't need a 4-year degree to learn the best parts of ...

30:25
RubyConf 2016 - Computer Science: The Good Parts by Jeffrey Cohen

1,063 views

9 years ago

Jon Gjengset
Decrusting the serde crate

In this stream, we peel back the crust on the serde crate — https://github.com/serde-rs/serde/ — and explore its interface, structure, ...

1:51:21
Decrusting the serde crate

77,586 views

3 years ago

Jon Gjengset
Crust of Rust: Sorting Algorithms

In this Crust of Rust episode, we implement some common sorting algorithms in Rust. This episode doesn't aim to explain any ...

2:37:53
Crust of Rust: Sorting Algorithms

67,058 views

5 years ago

NPTEL IIT Guwahati
Lec 7: Bayes Decision Theory - Binary Features

Machine Learning and Deep Learning - Fundamentals and Applications https://onlinecourses.nptel.ac.in/noc23_ee87/preview ...

1:05:49
Lec 7: Bayes Decision Theory - Binary Features

6,828 views

2 years ago

Jon Gjengset
Crust of Rust: std::collections

In this video we go over the various collection types in the Rust standard library (effectively `std::collections`), and discuss a bit ...

2:45:04
Crust of Rust: std::collections

85,094 views

2 years ago

DEFCONConference
Sheila Ayelen Berta - Backdooring Hardware by Injecting Malicious Payloads - DEF CON 27 Conference

Is targeting microcontrollers worth the effort? Nowadays, they are responsible for controlling a wide range of interesting systems, ...

37:43
Sheila Ayelen Berta - Backdooring Hardware by Injecting Malicious Payloads - DEF CON 27 Conference

2,589 views

6 years ago

DEFCONConference
Leon Jacobs - Meticulously Modern Mobile Manipulations - DEF CON 27 Conference

Mobile app hacking peaked in 2015 with tools like keychain-dumper & ssl-kill-switch released but requiring jailbroken/rooted ...

36:43
Leon Jacobs - Meticulously Modern Mobile Manipulations - DEF CON 27 Conference

1,936 views

6 years ago

nptelhrd
Mod-16 Lec-20 Tutorial - I

High Performance Computer Architecture by Prof.Ajit Pal,Department of Computer Science and Engineering,IIT Kharagpur.

52:24
Mod-16 Lec-20 Tutorial - I

2,857 views

11 years ago

DEFCONConference
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

Shor's Algorithm for factoring integer numbers is the big threat to cryptography (RSA/ECC) as it reduces the complexity from ...

48:42
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

14,398 views

6 years ago

DEFCONConference
Joshua Maddux - API Induced SSRF How ApplePay Scattered Vulns Across the Web - DEF CON 27 Conference

The 2016 WWDC saw the dawn of Apple Pay Web, an API that lets websites embed an Apple Pay button within their web-facing ...

40:48
Joshua Maddux - API Induced SSRF How ApplePay Scattered Vulns Across the Web - DEF CON 27 Conference

5,275 views

6 years ago

Carnegie Mellon University Libraries
Episode 3 | Leibniz, Turing, Enigma: Collecting the History of Computing at CMU Libraries

In this third episode of “Coffee with the Curator"—a series featuring distinctive objects from Carnegie Mellon University's collection ...

25:34
Episode 3 | Leibniz, Turing, Enigma: Collecting the History of Computing at CMU Libraries

712 views

4 years ago

wikipedia tts
Coding theory | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Coding_theory 00:01:44 1 History of coding theory ...

23:39
Coding theory | Wikipedia audio article

26 views

7 years ago

Input Output Group
IOHK | Cardano development techniques, with Duncan Coutts, PhD

Cardano is being developed with the aim of making it high assurance software. This is code that is rigorously developed using ...

59:24
IOHK | Cardano development techniques, with Duncan Coutts, PhD

6,775 views

7 years ago

NPTEL IIT Bombay
Lecture 18 : Arrays and recursion : Part 1 : Binary Search Introduction

Arrays and recursion : Part 1 : Binary Search Introduction.

30:27
Lecture 18 : Arrays and recursion : Part 1 : Binary Search Introduction

5,575 views

6 years ago

NPTEL IIT Bombay
Week 11: Lecture 43: FedAvg Algorithm

FedAvg Algorithm.

22:27
Week 11: Lecture 43: FedAvg Algorithm

1,344 views

1 year ago

OpenSecurityTraining2
Day 1 Part 1: Introductory Intel x86: Architecture, Assembly, Applications

You should go watch "Architecture 1001: x86-64 Assembly" https://ost2.fyi/Arch1001 instead of this class! It's newer, way better, ...

1:26:50
Day 1 Part 1: Introductory Intel x86: Architecture, Assembly, Applications

311,785 views

13 years ago

In One Lesson
How a CPU Works

Learn how the most important component in your device works, right here! Author's Website: http://www.buthowdoitknow.com/ See ...

20:00
How a CPU Works

8,470,748 views

12 years ago