ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

48 results

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

145,592 views

9 years ago

Wireless Explained
Link Adaptation in 4G and 5G: Transport Block Size Computation

This video describes Transport Block size computation in 4G and 5G, from MCS and number of Resource Elements (REs) ...

10:48
Link Adaptation in 4G and 5G: Transport Block Size Computation

7,868 views

2 years ago

DEFCONConference
DEF CON 29 - Seth Kintigh  - OTA remote code execution on the DEF CON 27 badge via NFMI

The DEF CON 27 badge employed an obscure form of wireless communication: Near Field Magnetic Inductance (NFMI).

47:30
DEF CON 29 - Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMI

1,395 views

4 years ago

wikipedia tts
Longitudinal redundancy check | Wikipedia audio article

This is an audio version of the Wikipedia Article: Longitudinal redundancy check Listening is a more natural way of learning, when ...

2:53
Longitudinal redundancy check | Wikipedia audio article

67 views

7 years ago

Wisc-Online
Async And Await

Explore how async and await is used in mobile programming to allow multiple tasks to happen at once.

5:17
Async And Await

777 views

9 years ago

Hetman Software: Восстановление данных и ремонт ПК
Как исправить ошибку циклического избыточного кода CRC на внешнем жестком диске

Смотрите как исправить ошибку циклического избыточного кода CRC, появившаяся на внешнем жестком диске.

14:25
Как исправить ошибку циклического избыточного кода CRC на внешнем жестком диске

6,229 views

1 year ago

XlogicX
Toorcon 15 - Mask Your Checksums - The Gorry Details

As presented at ToorCon 15 in San Diego, CA When publicly submitting packet data, it is common wisdom to mask things such as ...

19:16
Toorcon 15 - Mask Your Checksums - The Gorry Details

217 views

12 years ago

Cybersecurity and Privacy Institute UWaterloo
How can we use Blockchain and what is Post-Quantum cryptography? - Behind the Firewall

In this episode of "Behind the Firewall", we sat down with Guang Gong, CPI member and professor at the department of Electrical ...

4:24
How can we use Blockchain and what is Post-Quantum cryptography? - Behind the Firewall

89 views

2 years ago

Kevin at BCH
Epson Error 033001 - Expression XP-4105  Troubleshoot Diagnosis

We troubleshoot Error 033001 for an Epson Expression XP-4105 printer. We found the problem is the circuit short on the ...

2:59
Epson Error 033001 - Expression XP-4105 Troubleshoot Diagnosis

43,407 views

3 years ago

GoDaddy
How to Be Efficient While Working From Home

How to Be Efficient While Working From Home ✓Read More Here ➜ http://bit.ly/3dRiPAtGoDaddy As more and more companies ...

5:28
How to Be Efficient While Working From Home

2,952 views

5 years ago

R-Ladies Global
R-Ladies New York (English) - Publishing your R or Data Science book with Chapman & Hall/CRC Press

Speakers: Rob Calver, Senior Publisher for Statistics, Mathematics and Physics (Twitter: @robcalver5) Randi Cohen, Publisher for ...

57:45
R-Ladies New York (English) - Publishing your R or Data Science book with Chapman & Hall/CRC Press

146 views

3 years ago

Sayanee Basu
I built a LoRa-GPS Tracker // Range test, battery life & firmware

lora #gps #eink I built my LoRa-GPS Tracker with PCBs from PCBWay https://www.pcbway.com. I worked on the firmware and ran ...

14:36
I built a LoRa-GPS Tracker // Range test, battery life & firmware

63,953 views

3 years ago

Lisk
What is Hashing? Hash Functions Explained Simply

What is hashing? In this video we explain how hash functions work in an easy to digest way. Hashing is the process of converting ...

2:36
What is Hashing? Hash Functions Explained Simply

447,570 views

7 years ago

Australian Building Codes Board
Applying the Performance Solution process: Energy Efficiency Case Study

Evan Logan, senior sustainability consultant at CADDS Group, presents an introduction on applying the process for developing ...

14:38
Applying the Performance Solution process: Energy Efficiency Case Study

1,666 views

4 years ago

Hetman Software: Data Recovery for Windows
🐧🍏 Sparse Files in Windows, Linux and MacOS, File Systems NTFS, REFS, Ext3, Ext4, BTRFS and APFS 🐧🍏

Keep on watching to find out: what files are called sparse files, what are their pros and cons, what file systems support them, how ...

10:30
🐧🍏 Sparse Files in Windows, Linux and MacOS, File Systems NTFS, REFS, Ext3, Ext4, BTRFS and APFS 🐧🍏

1,745 views

4 years ago

Meri (Engel) Kasprak - programming videos
merihelp.net: Installing Aptana Studio

Installing Aptana studio for the Web Fundamentals clas.

7:40
merihelp.net: Installing Aptana Studio

1,841 views

12 years ago

Australian Building Codes Board
Fire Safety Verification Method: An introduction

The Fire Safety Verification Method (FSVM) provides one way to verify that a fire safety Performance Solution meet the relevant ...

6:05
Fire Safety Verification Method: An introduction

2,174 views

5 years ago

OLS
Open Life Science OLS-6 cohort application: launch webinar

This is a launch webinar announcing the applications for the next cohort of Open Life Science cohort 6 (OLS-6) training.

39:19
Open Life Science OLS-6 cohort application: launch webinar

151 views

3 years ago

wikipedia tts
Planetmath.org | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/PlanetMath 00:01:03 1 Content 00:02:25 1.1 Content ...

7:40
Planetmath.org | Wikipedia audio article

4 views

6 years ago

wikipedia tts
Group 4 compression | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Group_4_compression 00:02:13 See also 00:02:30 ...

3:09
Group 4 compression | Wikipedia audio article

70 views

7 years ago