ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

29,038 results

Improbable Matter
How a Computer Works - from silicon to apps

A whistle-stop tour of how computers work, from how silicon is used to make computer chips, perform arithmetic to how programs ...

42:32
How a Computer Works - from silicon to apps

1,946,020 views

5 years ago

The Master of Computing (Programming and Security)
Hacking Websites with SQL Injection   Computerphile
8:59
Hacking Websites with SQL Injection Computerphile

29 views

5 years ago

The Coding Gopher
99% of Developers Don't Get Sockets

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher ⬆️ Best project-based coding platform.

12:05
99% of Developers Don't Get Sockets

490,303 views

9 months ago

Amanda Eyre
NEWS: Computerphile's vid. WhaleClub invite. Adblock-to-Bitcoin.

Popular YouTube channel leaves viewers with crypto questions. Quantum computing's potential effects on crypto -- where you at?

4:51
NEWS: Computerphile's vid. WhaleClub invite. Adblock-to-Bitcoin.

1,219 views

10 years ago

Brian Will
Object-Oriented Programming is Bad

An explanation of why you should favor procedural programming over Object-Oriented Programming (OOP).

44:35
Object-Oriented Programming is Bad

2,536,597 views

10 years ago

The Coding Gopher
Docker vs. Kubernetes: The ONLY Video You Need to Finally Understand Containers!

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher Join my free newsletter on Go & backend ...

5:51
Docker vs. Kubernetes: The ONLY Video You Need to Finally Understand Containers!

289,592 views

1 year ago

GitLab
Git Internals -  How Git Works - Fear Not The SHA!

Fascinated with git? Frustrated with git? Take a moment to understand how git it works under the hood! In this short 30-min ...

31:23
Git Internals - How Git Works - Fear Not The SHA!

126,623 views

8 years ago

techNyouvids
Critical Thinking Part 5: The Gambler's Fallacy

Part 5 of the TechNyou critical thinking resource. The resource covers basic logic and faulty arguments, developing student's ...

2:57
Critical Thinking Part 5: The Gambler's Fallacy

308,486 views

14 years ago

The Coding Gopher
Just-In-Time (JIT) Compilers Explained

Get 40% OFF CodeCrafters: https://app.codecrafters.io/join?via=the-coding-gopher Business Inquiries & Partnerships: ...

8:58
Just-In-Time (JIT) Compilers Explained

60,329 views

7 months ago

Pastie's Bin
Animated Padding Oracle Attack

Animated explanation of attacking CBC encryption and a padding oracle This is my first video explaining a security concept in an ...

3:58
Animated Padding Oracle Attack

14,829 views

9 years ago

Harsh Patel
BGP Hijack Explained

Courtesy - Jorge Ribas.

1:51
BGP Hijack Explained

16,130 views

10 years ago

Timo Bingmann
Tim Sort

Visualization and "audibilization" of the TimSort algorithm. Sorts a random shuffle of the integers [1100] using TimSort (standard ...

2:08
Tim Sort

236,311 views

12 years ago

The Coding Gopher
Why LLVM is a Game Changer for Compilers

Explore the inner workings of LLVM, the powerful framework behind many modern compilers! In this video, we break down key ...

6:31
Why LLVM is a Game Changer for Compilers

39,775 views

1 year ago

TechPrep
Process vs Thread | Simply Explained

This is a solution to the classic Process vs. Thread technical interview question. ⏰ Time Stamps ⏰ 0:00 Program 0:25 Process ...

2:49
Process vs Thread | Simply Explained

51,067 views

1 year ago

Concepts Illuminated
An Image Detecting Spreadsheet: Implementing Convolutional Neural Networks From Scratch Part 1

This is Part 1 in a series in which we create a convolutional neural network (CNN) in a spreadsheet. In this video, we teach the ...

14:03
An Image Detecting Spreadsheet: Implementing Convolutional Neural Networks From Scratch Part 1

9,849 views

4 years ago

Anthony Vance
How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)

This video explains how to compute the RSA algorithm, including how to select values for d, e, n, p, q, and φ (phi).

18:27
How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)

329,967 views

11 years ago

Canadian Coding
Animated Explanation of the one-time pad

Video walkthrough of code implementation: https://youtu.be/50XM-h3h6Fw Explanation of converting from decimal to binary: ...

4:33
Animated Explanation of the one-time pad

52,428 views

5 years ago

Ariel Weinberger
JWT Explained In Under 10 Minutes (JSON Web Tokens)

JWT (JSON Web Tokens) explained in under 10 minutes! Authentication, authorization, refresh tokens, statelessness, and more.

9:18
JWT Explained In Under 10 Minutes (JSON Web Tokens)

48,943 views

1 year ago

Rayan Kiwan electronics
cmd star War movie  @AlanGamingHD @TheCodingTrain @Computerphile@Veraxity @WINDOWS_TRICKS

starwars #starwarsbattlefront2 #cmd #tricks #hacker #engineering #programming #coding #technology #tech On Windows, open ...

6:25
cmd star War movie @AlanGamingHD @TheCodingTrain @Computerphile@Veraxity @WINDOWS_TRICKS

166 views

3 years ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

146,289 views

9 years ago