ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

231 results

Vu Hung Nguyen (Hưng)
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

Cryptographic Hash Functions Explained: SHA, Security & Applications Overview: This episode provides a comprehensive look ...

7:21
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

9 views

3 months ago

YAWL User Group
BPMN: Parallel Gateway

How does BPMN synchronize parallel tasks? The video explains the function of a diamond shape with a plus sign in a BPMN ...

0:21
BPMN: Parallel Gateway

1,670 views

9 months ago

Mental Outlaw
OpenSSH Gets Post Quantum Encryption

In this video I discuss the new updates to OpenSSH 10.0 including post quantum encryption enabled by default. Read the full ...

8:17
OpenSSH Gets Post Quantum Encryption

99,716 views

8 months ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

164,077 views

2 months ago

southeastlinuxfest
Bruce Momjian - Fundamentals of Modern Cryptography and TLS

2025 Southeast Linuxfest: This presentation covers the fundamentals of modern digital cryptography and TLS, including popular ...

1:43:27
Bruce Momjian - Fundamentals of Modern Cryptography and TLS

60 views

6 months ago

NPTEL IIT Bombay
Week 4 : Lecture 20 : Authentication: Part 1

Lecture 20 : Authentication: Part 1.

31:19
Week 4 : Lecture 20 : Authentication: Part 1

507 views

11 months ago

Vu Hung Nguyen (Hưng)
21 A Toolkit for Digital Trust

Deep Dive into Cryptography: SHA, HMAC, RSA & Diffie-Hellman Explained Overview: This episode provides a detailed technical ...

9:11
21 A Toolkit for Digital Trust

2 views

3 months ago

NPTEL IIT Bombay
Week 4 : Lecture 23 : Authentication: Part 4

Lecture 23 : Authentication: Part 4.

30:13
Week 4 : Lecture 23 : Authentication: Part 4

329 views

11 months ago

Vu Hung Nguyen (Hưng)
02 The Tools of Cryptography

Mastering Cryptographic Tools: Symmetric, Asymmetric, Hashes & Digital Signatures Overview: This episode provides a ...

8:25
02 The Tools of Cryptography

21 views

3 months ago

Vu Hung Nguyen (Hưng)
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

Understanding Message Authentication Codes (MACs) Explained Overview: This episode dives deep into Message ...

7:06
12 Secure Your Messages: Understanding Message Authentication Codes (MACs) #AI #NLP #Tech #Podcast

2 views

3 months ago

Einsteinzee
PISO(Pressure-Implicit with Splitting of Operators) Algorithm in OpenFOAM - theory vs implementation

This video is part of the new series called "Learning by doing :: OpenFOAM" which is dedicated to random topics related to ...

1:11:43
PISO(Pressure-Implicit with Splitting of Operators) Algorithm in OpenFOAM - theory vs implementation

349 views

8 months ago

fortranized_pythonista
How to write the first program | Tutorial | Fortran for beginners | #fortran

How to write the first program in Fortran. How to program hello world in Fortran. My setup: Windows Visual Studio Code GFortran ...

0:40
How to write the first program | Tutorial | Fortran for beginners | #fortran

1,132 views

8 months ago

Zeek
Zeek and Post-Quantum Cryptography Discovery – Vincent Stoffer | Field CTO at Corelight

What happens when quantum computers can break today's encryption? In this talk, Vince Stoffer (Corelight Field CTO) explains ...

18:13
Zeek and Post-Quantum Cryptography Discovery – Vincent Stoffer | Field CTO at Corelight

174 views

4 months ago

Nida Karagoz
MAC address lengths reported by nftables in logs doesn't always consist of 12 hexadecimal digits

MAC address lengths reported by nftables in logs doesn't always consist of 12 hexadecimal digits ✧ I really hope you found a ...

2:29
MAC address lengths reported by nftables in logs doesn't always consist of 12 hexadecimal digits

6 views

7 months ago

NPTEL IIT Bombay
Week 3 : Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4

Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4.

27:53
Week 3 : Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4

311 views

11 months ago

Кафедра ММЗІ
Hash functions and MAC codes, lecture 04-2: Floyd's algorithm, Brent's algorithm, Nivash's algorithm

Course "Hash Functions and Authentication Codes", lecture No. 04 The following issues were considered: — algorithms for ...

22:23
Hash functions and MAC codes, lecture 04-2: Floyd's algorithm, Brent's algorithm, Nivash's algorithm

14 views

3 months ago

Nida Karagoz
can't compile c++ hello world with clang on mac sequoia 15.0 and VS Code

can't compile c++ hello world with clang on mac sequoia 15.0 and VS Code ✧ I really hope you found a helpful solution!

2:52
can't compile c++ hello world with clang on mac sequoia 15.0 and VS Code

6 views

7 months ago

Obaji Akpet
YouTube’s Algorithm EXPOSED  What Works in 2025

YouTube Algorithm 2025 EXPOSED! Learn what really matters now—CTR, retention, Shorts vs long-form, and U.S. growth hacks ...

2:51
YouTube’s Algorithm EXPOSED What Works in 2025

6 views

3 months ago

Prisma
Prisma 7 is here.

Prisma 7 is here. The next major release of *Prisma ORM* and *Prisma Postgres* makes it simpler and faster to build modern ...

3:08
Prisma 7 is here.

23,954 views

1 month ago

Moonwood Games
Struggling With RPG Maker To Make My Indie Game #indiegame #indiedev #gamedev

Should I be using RPG Maker to make my randomly generated, dungeon crawling, rougelite RPG? Probably not. But it's what I ...

0:15
Struggling With RPG Maker To Make My Indie Game #indiegame #indiedev #gamedev

302,461 views

9 months ago