ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

891 results

SiliconANGLE theCUBE
Day One Wrap | Informatica World 2017

John Furrier & Peter Burris wrap up day one of Informatica World 2017 with Wikibon Analyst Neil Raden.

20:51
Day One Wrap | Informatica World 2017

126 views

8 years ago

DEFCONConference
Marina Simakov - Relaying Credentials has Never Been Easier - DEF CON 27 Conference

Active Directory has always been a popular target for attackers, with a constant rise in attack tools attempting to compromise and ...

44:26
Marina Simakov - Relaying Credentials has Never Been Easier - DEF CON 27 Conference

2,207 views

6 years ago

ITFreeTraining
Computer Memory - CompTIA A+ 220-1101 – 2.9

Let's have a look at computer memory. Download PowerPoint: https://itfreetraining.com/handouts/ap11/2c10.pptx What is ...

22:14
Computer Memory - CompTIA A+ 220-1101 – 2.9

1,061 views

11 months ago

DFIRScience
DFS101: 1.1 Introduction to digital forensics

Welcome to the course - Introduction to digital forensics. This course assumes no prior knowledge of digital investigations or IT.

21:41
DFS101: 1.1 Introduction to digital forensics

195,079 views

5 years ago

SiliconANGLE theCUBE
Amit Walia, Informatica | CUBEConversations, Feb 2020

Amit Walia, CEO of Informatica, sits down with John Furrier for a CUBEConversation at theCUBE Studios in Palo Alto, CA.

25:45
Amit Walia, Informatica | CUBEConversations, Feb 2020

1,123 views

5 years ago

DEFCONConference
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference

Athletes are competing in virtual cycling by riding real bikes on stationary trainers which power the in-game athletic performance.

39:03
Brad Dixon - Cheating in eSports How to Cheat at Virtual Cycling - DEF CON 27 Conference

135,166 views

6 years ago

SiliconANGLE theCUBE
Sanjeev Vohra, Accenture | Informatica World 2018

Sanjeev Vohra, Group Technology Officer, Accenture joins theCUBE hosts John Furrier (@furrier) and Peter Burris (@plburris) live ...

24:50
Sanjeev Vohra, Accenture | Informatica World 2018

1,178 views

7 years ago

SiliconANGLE theCUBE
Jerry Held, Informatica | Informatica World 2018

Jerry Held, Board Member, Informatica joins theCUBE hosts John Furrier (@furrier) and Peter Burris (@plburris) live from ...

21:57
Jerry Held, Informatica | Informatica World 2018

189 views

7 years ago

OpenSecurityTraining2
Day 1 Part 1: Introductory Intel x86: Architecture, Assembly, Applications

You should go watch "Architecture 1001: x86-64 Assembly" https://ost2.fyi/Arch1001 instead of this class! It's newer, way better, ...

1:26:50
Day 1 Part 1: Introductory Intel x86: Architecture, Assembly, Applications

311,991 views

13 years ago

Computing for All
Computer Ethics

By: Dr. Jeetendra Pande.

29:22
Computer Ethics

24,170 views

6 years ago

DEFCONConference
DEF CON 21 - Kenneth Lee - How to use CSP to stop XSS

How to use CSP to stop XSS KENNETH LEE PRODUCT SECURITY ENGINEER, ETSY INC. Crosssite scripting attacks have ...

21:39
DEF CON 21 - Kenneth Lee - How to use CSP to stop XSS

1,385 views

12 years ago

DEFCONConference
DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chick

Our current administration lists "Defend Critical Infrastructure" as the #1 item in the 2023 National Cybersecurity Strategy.

41:53
DEF CON 31 - Power Corrupts Corrupt It Back! Hacking Power Management in Data Centers - Quinn, Chick

2,136 views

2 years ago

DHIS2
1.1.1 - Data Quality Academy - Foundational Data Quality Concepts

0:55 - Data Quality: Definitions and relevance 8:00 - Data Quality Dimensions 18:28 - Common data quality issues and strategies ...

32:17
1.1.1 - Data Quality Academy - Foundational Data Quality Concepts

3,659 views

5 years ago

SiliconANGLE theCUBE
Bala Kumaresan | Informatica World 2017

Bala Kumaresan, SVP & GM of Data Security at Informatica, sits down with John Furrier & Peter Burris at Informatica World 2017, ...

21:12
Bala Kumaresan | Informatica World 2017

1,248 views

8 years ago

DEFCONConference
Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference

Secure facilities in North America use lock systems like Medeco, Abloy, Assa and Mul-T-Lock partly to resist lock picking, but also ...

46:19
Bill Graydon - Duplicating Restricted Mechanical Keys - DEF CON 27 Conference

109,143 views

6 years ago

IGCSE Central
I REVIEWED 5 YEARS OF COMPUTER SCIENCE PAST PAPERS

Dive deep into your IGCSE exam preparation with our comprehensive video covering all the MSQs, True and False, fill in the ...

37:05
I REVIEWED 5 YEARS OF COMPUTER SCIENCE PAST PAPERS

207 views

2 years ago

NYC Open Data Week
Dirty Data Part 1: Finding and Cleaning Anomalies

NYC Open Data Week 2025 (March 24) This is a virtual presentation illustrating how to undertake a data cleansing effort It is Part I ...

42:56
Dirty Data Part 1: Finding and Cleaning Anomalies

77 views

9 months ago

SiliconANGLE theCUBE
Suresh Menon, Informatica | CUBE Conversation, July 2020

Suresh Menon, SVP & GM, Master Data Management & 360 solutions at Informatica sits down with John Furrier for a Digital CUBE ...

23:07
Suresh Menon, Informatica | CUBE Conversation, July 2020

298 views

5 years ago

DEFCONConference
DEF CON 23 -  El Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths

Fuzzing is a well-established technique for finding bugs, hopefully exploitable ones, by brute forcing inputs to explore code paths ...

21:26
DEF CON 23 - El Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths

2,210 views

10 years ago

Computing for All
Cyber security techniques   II

By: Ms. Shahina Anwaru.

59:23
Cyber security techniques II

429 views

6 years ago