ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

108 results

Improbable Matter
How a Computer Works - from silicon to apps

A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...

42:32
How a Computer Works - from silicon to apps

1,930,379 views

4 years ago

DEFCONConference
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

Shor's Algorithm for factoring integer numbers is the big threat to cryptography (RSA/ECC) as it reduces the complexity from ...

48:42
Andreas Baumhof - Are Quantum Computers Really A Threat To Cryptography? - DEF CON 27 Conference

14,397 views

6 years ago

NPTEL IIT Bombay
Lecture 18 : Arrays and recursion : Part 1 : Binary Search Introduction

Arrays and recursion : Part 1 : Binary Search Introduction.

30:27
Lecture 18 : Arrays and recursion : Part 1 : Binary Search Introduction

5,575 views

6 years ago

Jon Gjengset
Decrusting the serde crate

In this stream, we peel back the crust on the serde crate — https://github.com/serde-rs/serde/ — and explore its interface, structure, ...

1:51:21
Decrusting the serde crate

77,487 views

3 years ago

Jon Gjengset
Crust of Rust: std::collections

In this video we go over the various collection types in the Rust standard library (effectively `std::collections`), and discuss a bit ...

2:45:04
Crust of Rust: std::collections

85,006 views

2 years ago

Jon Gjengset
Crust of Rust: Sorting Algorithms

In this Crust of Rust episode, we implement some common sorting algorithms in Rust. This episode doesn't aim to explain any ...

2:37:53
Crust of Rust: Sorting Algorithms

67,031 views

5 years ago

In One Lesson
How a CPU Works

Learn how the most important component in your device works, right here! Author's Website: http://www.buthowdoitknow.com/ See ...

20:00
How a CPU Works

8,470,154 views

12 years ago

Chrome for Developers
Compiling for the Web with WebAssembly (Google I/O '17)

WebAssembly is a fast, portable, compact, cross-browser binary format for compilation to the Web. It allows new types of ...

35:59
Compiling for the Web with WebAssembly (Google I/O '17)

62,146 views

8 years ago

Jon Gjengset
Crust of Rust: Lifetime Annotations

In the 2019 Rust Survey, a lot of people were asking for video content covering intermediate Rust content. So in this first video ...

1:33:23
Crust of Rust: Lifetime Annotations

265,613 views

5 years ago

DEFCONConference
Leon Jacobs - Meticulously Modern Mobile Manipulations - DEF CON 27 Conference

Mobile app hacking peaked in 2015 with tools like keychain-dumper & ssl-kill-switch released but requiring jailbroken/rooted ...

36:43
Leon Jacobs - Meticulously Modern Mobile Manipulations - DEF CON 27 Conference

1,936 views

6 years ago

YuriODev
Session 04: Mastering Searching Algorithms | Linear Search vs Binary Search

Session 04: Mastering Searching Algorithms | Linear Search vs Binary Search Welcome to the 4th session of our 25-part series!

36:23
Session 04: Mastering Searching Algorithms | Linear Search vs Binary Search

1,739 views

1 year ago

DEFCONConference
DEF CON 24 - Shellphish - Panel: Cyber Grand Shellphish

Last year, DARPA ran the qualifying event for the Cyber Grand Challenge to usher in the era of automated hacking. Shellphish ...

50:56
DEF CON 24 - Shellphish - Panel: Cyber Grand Shellphish

2,172 views

9 years ago

Jon Gjengset
Solving distributed systems challenges in Rust

In this stream we work through the fly.io distributed systems challenges (https://fly.io/dist-sys/) in Rust, and solve all the way up to ...

3:15:52
Solving distributed systems challenges in Rust

305,942 views

2 years ago

Tyler Caraza-Harter
CS 320 Oct 2 (Part 2) - BST Search

hello last time we were working on uh building this binary tree and it might have the node class and i kind of copied that and just ...

21:00
CS 320 Oct 2 (Part 2) - BST Search

209 views

5 years ago

NPTEL IIT Guwahati
Lec 7: Bayes Decision Theory - Binary Features

Machine Learning and Deep Learning - Fundamentals and Applications https://onlinecourses.nptel.ac.in/noc23_ee87/preview ...

1:05:49
Lec 7: Bayes Decision Theory - Binary Features

6,824 views

2 years ago

Cloud Native Rejekts
Advanced Integrated Monitoring with Prometheus Federation - Charles Pretzer, Buoyant

The name Prometheus is no longer synonymous with "The Messenger of the Gods". It has far greater responsibility in today's ...

30:26
Advanced Integrated Monitoring with Prometheus Federation - Charles Pretzer, Buoyant

4,143 views

5 years ago

CS50
Technical Interviews

Let me bring up the code to make it more concrete. We start with our choice of i-- we start with i equal to 0, we pick a random ...

40:53
Technical Interviews

84,815 views

13 years ago

DEFCONConference
Sheila Ayelen Berta - Backdooring Hardware by Injecting Malicious Payloads - DEF CON 27 Conference

Is targeting microcontrollers worth the effort? Nowadays, they are responsible for controlling a wide range of interesting systems, ...

37:43
Sheila Ayelen Berta - Backdooring Hardware by Injecting Malicious Payloads - DEF CON 27 Conference

2,589 views

6 years ago

OpenSecurityTraining2
Day 1 Part 1: Introductory Intel x86: Architecture, Assembly, Applications

You should go watch "Architecture 1001: x86-64 Assembly" https://ost2.fyi/Arch1001 instead of this class! It's newer, way better, ...

1:26:50
Day 1 Part 1: Introductory Intel x86: Architecture, Assembly, Applications

311,740 views

13 years ago

NPTEL IIT Bombay
Week 11: Lecture 43: FedAvg Algorithm

FedAvg Algorithm.

22:27
Week 11: Lecture 43: FedAvg Algorithm

1,318 views

1 year ago