ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

132 results

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

447,001 views

7 years ago

Bald. Bearded. Builder.
The Secret to Mastering Queue, Stack and Dictionary in C#!

Ever wonder when to use a queue, a stack, or a hashtable in C#? In this video, Michael explains the story behind FIFO vs LIFO ...

13:30
The Secret to Mastering Queue, Stack and Dictionary in C#!

11,295 views

2 months ago

Matthew Weathers
The unsolved math problem which could be worth a billion dollars.

You can find it here: https://youtu.be/LzhJjSRad5A ) Bitcoin and other "crypto-currencies" rely on one-way hash functions like the ...

5:59
The unsolved math problem which could be worth a billion dollars.

2,510,439 views

6 years ago

cs631apue
Advanced Programming in the UNIX Environment: Week 04, Segment 6 - getpwuid(2) and /etc/groups

In this video lecture, we look at the library functions used to look up account information. We learn about how primary and ...

15:29
Advanced Programming in the UNIX Environment: Week 04, Segment 6 - getpwuid(2) and /etc/groups

1,858 views

5 years ago

Jon Gjengset
Live-coding a linked hash map in Rust

Following another Twitter poll (https://twitter.com/Jonhoo/status/1000102031925956610), we're building a simple hash map in ...

2:29:40
Live-coding a linked hash map in Rust

39,412 views

7 years ago

Relaxing With Code
Rust StatsD Proxy - 06 Bitwise Ops and Overflows

Beginning to port a hashing function from C to Rust. We'll use it in our sharding logic.

13:31
Rust StatsD Proxy - 06 Bitwise Ops and Overflows

36 views

4 years ago

Neo4j
Creating and Manipulating Data-Structures (Map, Dict, Hash) with APOC (#7)

While Cypher can create and use literal maps/documents, APOC adds functions to create and update them dynamically and also ...

14:44
Creating and Manipulating Data-Structures (Map, Dict, Hash) with APOC (#7)

3,699 views

7 years ago

CMPUT 175
10   Dictionaires—CMPUT 175

Topics covered: - Key/value pairs - Indexing - .keys() - .values() 2018 © University of Alberta This work is licensed under a ...

5:39
10 Dictionaires—CMPUT 175

4,308 views

8 years ago

Jon Gjengset
Porting Java's ConcurrentHashMap to Rust (part 2)

In this stream we continue the work of porting Java's ConcurrentHashMap to Rust. We finish up the concurrent hash table resizing ...

5:20:13
Porting Java's ConcurrentHashMap to Rust (part 2)

13,459 views

6 years ago

Md. Sakibur Rahman
List vs Hashset in C# - Bangla tutorial #List #Hashset #csharp

List vs Hashset in C# - Bangla tutorial #List #Hashset #csharp In C#, a #List and #HashSet have some differences: In C, the ...

5:32
List vs Hashset in C# - Bangla tutorial #List #Hashset #csharp

10 views

1 year ago

CyberGhost VPN
What is hashing? | CyberGhost VPN Glossary

Hashing is a method of transforming data, such as a password, into a unique code of fixed length, called a hash. The process is ...

1:04
What is hashing? | CyberGhost VPN Glossary

229 views

1 year ago

wikipedia tts
NIST hash function competition | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NIST_hash_function_competition 00:01:13 1 Process ...

8:02
NIST hash function competition | Wikipedia audio article

29 views

6 years ago

John Kubiatowicz
CS162 Lecture 24 (4/28/2020): Distributed File Systems (Finished), Key-Value Stores, and Chord

In this lecture we finish our discussion of Distributed File Systems and cache consistency, and then dive into a discussion of ...

1:25:22
CS162 Lecture 24 (4/28/2020): Distributed File Systems (Finished), Key-Value Stores, and Chord

1,866 views

5 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Imphash algorithm explained

The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is ...

5:43
Malware Theory - Imphash algorithm explained

5,850 views

4 years ago

Cours Python
3.3 Tables de hash

... que c'est indépendant du nombre d'éléments dans notre table de hash. C'est donc une structure de données très intéressante ...

8:18
3.3 Tables de hash

5,999 views

7 years ago

Jon Gjengset
Crust of Rust: std::collections

In this video we go over the various collection types in the Rust standard library (effectively `std::collections`), and discuss a bit ...

2:45:04
Crust of Rust: std::collections

85,007 views

2 years ago

Rafiq Bouhsen
19.Immutability: Hashing and Chaining with Proof of Work

Source: EDX LinuxFoundationX LFS170x Blockchain: Understanding Its Uses and Implications ...

7:43
19.Immutability: Hashing and Chaining with Proof of Work

12 views

4 years ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

145,227 views

9 years ago

All Systems Go!
2017 Synchronizing images with casync

https://media.ccc.de/c/asg2017/ASG2017-125-synchronizing_images_with_casync casync is a novel tool for delivering OS ...

46:44
2017 Synchronizing images with casync

293 views

8 years ago

FlareXes
Enable GPU for Hashcat  |  Hashcat GPU is not working FIXED

Simple fix to enable GPU support in hashcat for hash cracking. ~ Links Website: https://flarexes.com/ GitHub: ...

4:31
Enable GPU for Hashcat | Hashcat GPU is not working FIXED

20,110 views

3 years ago