ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

65 results

Daily Code Buffer
Microservices using SpringBoot | Full Example

In this video, you will learn about implementing Microservice Architecture. We will be implementing different libraries and ...

1:21:39
Microservices using SpringBoot | Full Example

1,086,358 views

5 years ago

Java Techie
Spring Boot 3.0  + Spring Security 6 | JWT Authentication & Authorization | JavaTechie

In this video, you'll learn how to implement JWT authentication and authorization in a Spring Boot 3.0 application using Spring ...

51:48
Spring Boot 3.0 + Spring Security 6 | JWT Authentication & Authorization | JavaTechie

215,687 views

2 years ago

The Dev World - by Sergio Lema
How to SECURE My Microservices Architecture (REACTJS + SPRING CLOUD GATEWAY) With Keycloak

In this video I show how to connect a React application to a Spring Cloud Gateway backend using Keycloak as an Authorization ...

14:19
How to SECURE My Microservices Architecture (REACTJS + SPRING CLOUD GATEWAY) With Keycloak

26,337 views

2 years ago

Amigoscode
Spring Boot Tutorial for Beginners | Full Course 2025

Learn how to build real-world backend applications with Spring Boot in this hands-on crash course. Whether you're new to Spring ...

1:11:20
Spring Boot Tutorial for Beginners | Full Course 2025

167,947 views

8 months ago

Learn Code With Durgesh
🔥Master Microservices using Spring Boot 3.X  |  Hindi

In this video we are going to learn Microservices using spring boot 3. We will use latest version of spring, spring boot and spring ...

2:01:57
🔥Master Microservices using Spring Boot 3.X | Hindi

266,713 views

2 years ago

ByteByteGo
What Is A CDN? How Does It Work?

To get better at system design, subscribe to our weekly newsletter: https://bit.ly/3tfAlYD Checkout our bestselling System Design ...

4:24
What Is A CDN? How Does It Work?

335,980 views

3 years ago

ByteByteGo
Top 5 Most Used Architecture Patterns

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bytebytego.ck.page/subscribe ...

5:53
Top 5 Most Used Architecture Patterns

373,439 views

2 years ago

Smosh Games
The Best Of Board AF 2025

What was your favorite Board AF video of 2025? SUBSCRIBE: https://smo.sh/Sub2SmoshGames WEAR OUR JOKES: ...

6:11:52
The Best Of Board AF 2025

416,178 views

6 days ago

PBS Terra
I Know Why LA Burned. And It WILL Happen Again.

Nearly a year after the devastating Los Angeles fires, Weathered host Maiya May returns to document what recovery really looks ...

56:10
I Know Why LA Burned. And It WILL Happen Again.

19,318 views

1 day ago

Thorben Janssen
Spring & Spring Data JPA: Managing Transactions

Spring Boot and Spring Data JPA make the handling of transactions extremely simple. They enable you to declare your preferred ...

10:34
Spring & Spring Data JPA: Managing Transactions

72,209 views

5 years ago

dramacrush
I Married A Disabled CEO Everyone Looked Down On And Healed Him. Now He Worships Me Like A Queen!

Subscribe to my channel for more romantic contents about Chinese minidramas! Not a romcom babe, I'm the drama queen ...

1:49:58
I Married A Disabled CEO Everyone Looked Down On And Healed Him. Now He Worships Me Like A Queen!

354,852 views

2 months ago

Jared Owen
How does an Elevator work?

Ever wonder what really lifts an elevator? Inside the cables, locks, and clever mechanics that move us every day. Watch another ...

11:33
How does an Elevator work?

6,493,701 views

2 years ago

Java
Java 21 API New Features #RoadTo21

Learn about the many enhancements that Java 21 is giving you in the classes you are using every day. Java 21 is introducing ...

16:48
Java 21 API New Features #RoadTo21

58,720 views

2 years ago

MIT OpenCourseWare
1. Introduction, Threat Models

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Nickolai ...

1:17:13
1. Introduction, Threat Models

849,909 views

10 years ago

Monkey Manhwa Recap
I Don't Train. I Just Run [LIFE SIMULATIONS] to Gain 100 Years of Skills Instantly!

I Don't Train. I Just Run [LIFE SIMULATIONS] to Gain 100 Years of Skills Instantly! #animerecap #animerecap #manhwaedit ...

30:39:15
I Don't Train. I Just Run [LIFE SIMULATIONS] to Gain 100 Years of Skills Instantly!

3,518 views

1 day ago

IBM Technology
LangChain vs LangGraph: A Tale of Two Frameworks

Want to learn more about AI agents and assistants? Register for Virtual Agents Day here → https://ibm.biz/BdaAVa Download the ...

9:55
LangChain vs LangGraph: A Tale of Two Frameworks

443,092 views

1 year ago

World Wild Hearts
SEOUL, SOUTH KOREA (2026) | 15 Best Things To Do In & Around Seoul (+ Travel Tips)

SEOUL ACTIVITIES, EXPERIENCES & LINKS ☑️ DMZ day tour from Seoul: ...

19:51
SEOUL, SOUTH KOREA (2026) | 15 Best Things To Do In & Around Seoul (+ Travel Tips)

6,637 views

2 weeks ago

Александр ШЕЛЕСТ
🛏️ YOUR MOM IS HERE AND THERE! Zelensky’s reshuffles. Budanov as successor.

🛏️ YOUR MOM IS HERE AND THERE! Zelensky’s reshuffles. Budanov as successor. Passions over Maduro – Arestovych 🎙️ Interview ...

1:54:50
🛏️ YOUR MOM IS HERE AND THERE! Zelensky’s reshuffles. Budanov as successor.

315,801 views

Streamed 3 days ago

LiveOverflow
Understand Security Risk vs. Security Vulnerability!

What is the difference between a security vulnerability and a security risk? What is a Vulnerability: ...

12:50
Understand Security Risk vs. Security Vulnerability!

43,679 views

4 years ago

AskF5
Configuring CSRF protection (11.x -16.0.x)

In this video, AskF5 shows you how to configure cross-site request forgery (CSRF) protection. This demo uses the BIG-IP 15.1.0 ...

3:05
Configuring CSRF protection (11.x -16.0.x)

2,386 views

4 years ago