ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

62 results

Craig Piercy
Python built-in function: hash()

Keep in mind that `hash()` is most useful behind the scenes, as Python handles most hashing automatically for its built-in data ...

4:46
Python built-in function: hash()

172 views

11 months ago

Programming threads
Python Dictionaries Explained: Hashing, Performance & Big O Notation

Master Python dictionaries from the ground up — from the basic structure to how they work behind the scenes. In this tutorial, we ...

13:57
Python Dictionaries Explained: Hashing, Performance & Big O Notation

229 views

1 year ago

MMqd
The Function Every Graphics Programmer Gets Wrong

Find out why sine‑based hashes fall short and how uint‑based hashes outperform them. I'll walk you through my extensible uint ...

12:36
The Function Every Graphics Programmer Gets Wrong

1,222 views

10 months ago

Cours Python
3.3 Tables de hash

En Python, il faut savoir que les tables de hash ont été implémentées de manière très efficace ; vous n'avez pas à vous ...

8:18
3.3 Tables de hash

6,033 views

8 years ago

Jon Gjengset
Live-coding a linked hash map in Rust

Following another Twitter poll (https://twitter.com/Jonhoo/status/1000102031925956610), we're building a simple hash map in ...

2:29:40
Live-coding a linked hash map in Rust

39,607 views

7 years ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

147,260 views

9 years ago

J David Eisenberg
Chapter 12: Dictionaries

This video describes how to use a dictionary --- a set of key-and-value pairs. Other programming languages have similar ...

11:56
Chapter 12: Dictionaries

258 views

7 years ago

Hacklog
HACKLOG 1x16 - Data Security, Checksum and MD5 / SHA Hash (Subtitled)

The subtitles have been translated automatically. We apologize for any errors. If you want, you can help us translate them ...

8:26
HACKLOG 1x16 - Data Security, Checksum and MD5 / SHA Hash (Subtitled)

2,874 views

4 years ago

Neo4j
Creating and Manipulating Data-Structures (Map, Dict, Hash) with APOC (#7)

While Cypher can create and use literal maps/documents, APOC adds functions to create and update them dynamically and also ...

14:44
Creating and Manipulating Data-Structures (Map, Dict, Hash) with APOC (#7)

3,703 views

7 years ago

Cube Drone
Cube Drone - Bloom Filters

For more information on Bloom Filters, check the Wikipedias: http://en.wikipedia.org/wiki/Bloom_filter , for special topics like "How ...

3:32
Cube Drone - Bloom Filters

36,425 views

11 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Imphash algorithm explained

The imphash or import hash by Mandiant has been widely adopted by malware databases, security software and PE tools. What is ...

5:43
Malware Theory - Imphash algorithm explained

5,869 views

4 years ago

openOV
NeTEx Tutorial 1: The Basics in Python

This video contains a bit of background of the NeTEx standard to exchange public transport network and timetables. A series on ...

11:45
NeTEx Tutorial 1: The Basics in Python

629 views

2 years ago

B Cyber H
Code Your Own AES File Encryption in Python!

Learn how to secure your files with AES encryption in Python! In this beginner-friendly tutorial, I walk you through coding a Python ...

21:24
Code Your Own AES File Encryption in Python!

966 views

6 months ago

Haskell Weekly
Hash Flooding Aeson

Special guest Tom Sydney Kerckhove talks with Taylor Fausak about a denial of service vulnerability in Aeson, a Haskell library ...

26:13
Hash Flooding Aeson

71 views

4 years ago

John Kubiatowicz
CS162 Lecture 24 (4/28/2020): Distributed File Systems (Finished), Key-Value Stores, and Chord

In this lecture we finish our discussion of Distributed File Systems and cache consistency, and then dive into a discussion of ...

1:25:22
CS162 Lecture 24 (4/28/2020): Distributed File Systems (Finished), Key-Value Stores, and Chord

1,876 views

5 years ago

Solve Computer Science
Share Substack Notes on Mastodon via Jekyll - Part 2

Substack, the famous newsletter website, also has "Notes" which can be seen as similar to Tweets, Toots, etc... In this video I show ...

8:24
Share Substack Notes on Mastodon via Jekyll - Part 2

27 views

6 months ago

Confreaks
RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve

RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve Sometimes your fastest queries can ...

33:20
RubyConf 2018 - Cache is King: Get the Most Bang for Your Buck From Ruby by Molly Struve

4,538 views

7 years ago

Lisk
What are Digital Signatures and How Do They Work?

What is a Digital Signature? In this animation, we will explain how digital signatures work using cryptography. In some ways ...

2:52
What are Digital Signatures and How Do They Work?

828,277 views

7 years ago

Thousand Brains Project
2023/02 - Speedup Discussions - Part 1

In this video, Viviane Clay dives into optimizing performance in Monty's learning module, highlighting challenges in improving ...

54:54
2023/02 - Speedup Discussions - Part 1

213 views

1 year ago

Jon Gjengset
Porting Java's ConcurrentHashMap to Rust (part 2)

In this stream we continue the work of porting Java's ConcurrentHashMap to Rust. We finish up the concurrent hash table resizing ...

5:20:13
Porting Java's ConcurrentHashMap to Rust (part 2)

13,507 views

6 years ago