Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
147 results
Zig 0.15 release review with explanations and examples Voice by @tokisuno **Links:** - Release notes: ...
81,163 views
2 months ago
Some of you may be familiar with Avro, the Apache take on Google's Protocol Buffers. Where Protobuf has just one file format, ...
6,804 views
2 days ago
You can find the lecture notes and exercises for this lecture at https://missing.csail.mit.edu/2020/editors/ Help us caption ...
417,659 views
6 years ago
This video will cover all of the difficult topics and differences between C++ and a managed language such as C# or Java. Things ...
25,883 views
5 years ago
The term “data-oriented programming” is often mentioned in the digital halls of the Clojure community, but what does it mean?
7,632 views
3 years ago
Do NOT combine unnecessary code, please turn ON your brains [both host sides - CLR/Native/JVM]. /This is Part 2. C++, C# and ...
14,099 views
7 years ago
As has become tradition, it's time for another new year's Q&A! In the span of three hours, we got through 45 questions covering ...
18,726 views
1 month ago
In this stream, we start implementing the concurrency algorithm from the academic paper "A Practical Wait-Free Simulation for ...
49,976 views
4 years ago
We demonstrate how to write a Java Servlet that will act as the Controller and View component of a Java Web Appliction.
7,441 views
11 years ago
Over the last year, synchronized and coordinated attacks against critical infrastructure have taken center stage. Remote cyber ...
1,076 views
9 years ago
printk: Why is it so complicated? Speaker John Ogness (Linutronix GmbH) Description The printk() function has a long history of ...
1,580 views
Recursion Part 3 : How to think about recursion.
13,663 views
Recursion Part 1 : Introduction.
12,834 views
Quantum computation has recently become an important area for security research, with its applications to factoring large ...
1,421 views
10 years ago
The esoteric art of patching ELF binaries has a long and fascinating history who's roots are deep within the hacking subculture; ...
2,531 views
2 years ago
Are you from a non-C.S. background? What about someone you mentor? Many junior devs' top focus is building technical ...
1,722 views
Discover the potential impact of Java Virtual Threads on Kotlin Coroutines, the popular alternative for asynchronous programming ...
1,462 views
1 year ago
In this talk, we will provide insight into both the documented and undocumented APIs available in Adobe Reader. Several code ...
3,091 views
"There was also a reviewer of the workflow patterns paper that literally said I do not think that such complex patterns can be used ...
915 views
Linux Programming & Scripting by Anand Iyer,Director, Calypto Design Systems.For more details on NPTEL visit http://nptel.ac.in.
4,908 views
Embedded Software Testing by Madhukeshwara H M,HCL Technologies,Bangalore.For more details on NPTEL visit ...
703 views
[00:08] Schwere algorithmische Probleme [02:30] Vorab Datenmenge reduzieren [05:45] Kritische Punkte vorab [08:56] Lösung ...
2,912 views
Week 1: Lecture 04 : Overview of memory and I/O hardware.
3,874 views
Lecture 22 : Tutorial Session - 4: Python implementation of Jacobi Method.
5,317 views
This is an audio version of the Wikipedia Article: Common Object Request Broker Architecture | Wikipedia audio article Listening ...
132 views