ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

888 results

SiliconANGLE theCUBE
Day One Wrap | Informatica World 2017

John Furrier & Peter Burris wrap up day one of Informatica World 2017 with Wikibon Analyst Neil Raden.

20:51
Day One Wrap | Informatica World 2017

126 views

8 years ago

ITFreeTraining
Computer Memory - CompTIA A+ 220-1101 – 2.9

Let's have a look at computer memory. Download PowerPoint: https://itfreetraining.com/handouts/ap11/2c10.pptx What is ...

22:14
Computer Memory - CompTIA A+ 220-1101 – 2.9

1,068 views

11 months ago

SiliconANGLE theCUBE
Amit Walia, Informatica | CUBEConversations, Feb 2020

Amit Walia, CEO of Informatica, sits down with John Furrier for a CUBEConversation at theCUBE Studios in Palo Alto, CA.

25:45
Amit Walia, Informatica | CUBEConversations, Feb 2020

1,123 views

5 years ago

DEFCONConference
Marina Simakov - Relaying Credentials has Never Been Easier - DEF CON 27 Conference

Active Directory has always been a popular target for attackers, with a constant rise in attack tools attempting to compromise and ...

44:26
Marina Simakov - Relaying Credentials has Never Been Easier - DEF CON 27 Conference

2,209 views

6 years ago

SiliconANGLE theCUBE
Jerry Held, Informatica | Informatica World 2018

Jerry Held, Board Member, Informatica joins theCUBE hosts John Furrier (@furrier) and Peter Burris (@plburris) live from ...

21:57
Jerry Held, Informatica | Informatica World 2018

189 views

7 years ago

DFIRScience
DFS101: 1.1 Introduction to digital forensics

Welcome to the course - Introduction to digital forensics. This course assumes no prior knowledge of digital investigations or IT.

21:41
DFS101: 1.1 Introduction to digital forensics

196,348 views

5 years ago

DEFCONConference
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference

Athletes are competing in virtual cycling by riding real bikes on stationary trainers which power the in-game athletic performance.

39:03
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference

135,175 views

6 years ago

SiliconANGLE theCUBE
Sanjeev Vohra, Accenture | Informatica World 2018

Sanjeev Vohra, Group Technology Officer, Accenture joins theCUBE hosts John Furrier (@furrier) and Peter Burris (@plburris) live ...

24:50
Sanjeev Vohra, Accenture | Informatica World 2018

1,179 views

7 years ago

OpenSecurityTraining2
Day 1 Part 1: Introductory Intel x86: Architecture, Assembly, Applications

You should go watch "Architecture 1001: x86-64 Assembly" https://ost2.fyi/Arch1001 instead of this class! It's newer, way better, ...

1:26:50
Day 1 Part 1: Introductory Intel x86: Architecture, Assembly, Applications

312,140 views

13 years ago

Computing for All
Computer Ethics

By: Dr. Jeetendra Pande.

29:22
Computer Ethics

24,282 views

6 years ago

SiliconANGLE theCUBE
Bala Kumaresan | Informatica World 2017

Bala Kumaresan, SVP & GM of Data Security at Informatica, sits down with John Furrier & Peter Burris at Informatica World 2017, ...

21:12
Bala Kumaresan | Informatica World 2017

1,248 views

8 years ago

DHIS2
1.1.1 - Data Quality Academy - Foundational Data Quality Concepts

0:55 - Data Quality: Definitions and relevance 8:00 - Data Quality Dimensions 18:28 - Common data quality issues and strategies ...

32:17
1.1.1 - Data Quality Academy - Foundational Data Quality Concepts

3,659 views

5 years ago

IGCSE Central
I REVIEWED 5 YEARS OF COMPUTER SCIENCE PAST PAPERS

Dive deep into your IGCSE exam preparation with our comprehensive video covering all the MSQs, True and False, fill in the ...

37:05
I REVIEWED 5 YEARS OF COMPUTER SCIENCE PAST PAPERS

208 views

2 years ago

DEFCONConference
DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chick

Our current administration lists "Defend Critical Infrastructure" as the #1 item in the 2023 National Cybersecurity Strategy.

41:53
DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chick

2,139 views

2 years ago

SiliconANGLE theCUBE
Suresh Menon, Informatica | CUBE Conversation, July 2020

Suresh Menon, SVP & GM, Master Data Management & 360 solutions at Informatica sits down with John Furrier for a Digital CUBE ...

23:07
Suresh Menon, Informatica | CUBE Conversation, July 2020

299 views

5 years ago

NYC Open Data Week
Dirty Data Part 1: Finding and Cleaning Anomalies

NYC Open Data Week 2025 (March 24) This is a virtual presentation illustrating how to undertake a data cleansing effort It is Part I ...

42:56
Dirty Data Part 1: Finding and Cleaning Anomalies

80 views

9 months ago

SiliconANGLE theCUBE
Amit Walia | BigData SV 2017

Amit Walia, from Informatica, sits down with George Gilbert and John Furrier at Big Data SV 2017 at the Fairmont Hotel in ...

24:39
Amit Walia | BigData SV 2017

515 views

8 years ago

DEFCONConference
Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference

Secure facilities in North America use lock systems like Medeco, Abloy, Assa and Mul-T-Lock partly to resist lock picking, but also ...

46:19
Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference

109,179 views

6 years ago

DEFCONConference
DEF CON 21 - Kenneth Lee - How to use CSP to stop XSS

How to use CSP to stop XSS KENNETH LEE PRODUCT SECURITY ENGINEER, ETSY INC. Crosssite scripting attacks have ...

21:39
DEF CON 21 - Kenneth Lee - How to use CSP to stop XSS

1,386 views

12 years ago

Kamil Laurent
Quantum Computers, Explained with Animations

Everyone is going crazy about quantum computers, but how do they actually work? In this video I animated the 3 basic ...

20:07
Quantum Computers, Explained with Animations

268,781 views

10 months ago