ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

75 results

Damien Burks
Legal Background to Cloud Engineering: What It Really Takes

Give Tarak a follow on LinkedIn: https://www.linkedin.com/in/tarak-bach-hamba/ Equipment & Gear Camera: ...

36:31
Legal Background to Cloud Engineering: What It Really Takes

79 views

2 days ago

Tom Olzak
Secure Network Infrastructure Design: An Engineering Approach

In this video we're going to design a secure network the way an engineer would design a bridge: we start with requirements, we ...

19:41
Secure Network Infrastructure Design: An Engineering Approach

30 views

2 days ago

Florida DrupalCamp
Engineering for security compliance: How to prepare before the audit

Security and privacy compliance certifications—like SOC 2 (a leading audit standard for security, availability, and confidentiality) ...

55:30
Engineering for security compliance: How to prepare before the audit

23 views

3 days ago

Dave Linthicum Is Not AI
Everyone Is Lying About AI — And It’s Not an Accident

For the last few years, Big Tech pushed a blunt message: AI will replace developers, automate entire departments, and become ...

16:47
Everyone Is Lying About AI — And It’s Not an Accident

21,090 views

4 days ago

Dave Linthicum Is Not AI
Laid Off? Turn Your Next 30 Days Into a Comeback Plan

Amazon just confirmed plans to cut roughly 16000 roles, including in AWS—another reminder that even “safe” high-tech jobs can ...

15:55
Laid Off? Turn Your Next 30 Days Into a Comeback Plan

5,402 views

6 days ago

Kanal13
Moscow and Minsk begin to recruit Hamas and Hezbollah for provocations on the Polish border
10:06
Moscow and Minsk begin to recruit Hamas and Hezbollah for provocations on the Polish border

0 views

0

Serhii Klymenko | The Resonant Manager
Why I stopped trusting my job title.

Two months ago, the music stopped. I realized my entire 10-year engineering reputation was locked inside a corporate walled ...

5:50
Why I stopped trusting my job title.

0 views

1 hour ago

An Hour of Innovation with Vit Lyoshin
Deepfake Detection with Voice AI: How Real-Time AI Stops Fraud & Security Threats | Carter Huffman

What if real-time Voice AI could detect the deepfake before the damage is done? In this episode of An Hour of Innovation podcast, ...

53:08
Deepfake Detection with Voice AI: How Real-Time AI Stops Fraud & Security Threats | Carter Huffman

31 views

2 days ago

Heapspace
Niek Palm - GitHub Actions Security: From CI Nightmare to Supply Chain Sentinel

This talk exposes GitHub Actions security risks: token leaks, script injections, and threats from untrusted third-party Actions or ...

33:14
Niek Palm - GitHub Actions Security: From CI Nightmare to Supply Chain Sentinel

17 views

2 days ago

Yale Applied Cryptography Laboratory
Cybersecurity Beyond Software and Hardware | Christof Paar, Max Planck Institute

Abstract: Classical physical-layer security (PLS) has been studied for nearly half a century. In the past, the main objective had ...

53:40
Cybersecurity Beyond Software and Hardware | Christof Paar, Max Planck Institute

10 views

4 days ago

igmGuru
Introduction & SSL Setup in Apache Kafka | Step-by-Step Security Guide [2026]

Secure your Apache Kafka cluster the right way from the beginning. This class explains Kafka fundamentals and then walks you ...

9:54
Introduction & SSL Setup in Apache Kafka | Step-by-Step Security Guide [2026]

16 views

6 days ago

Vaadin
What is possible on the web in 2026

Live webinar with Matti Tahvonen (DevRel at Vaadin) on what modern browsers can do in 2026. Device access (Bluetooth, USB, ...

55:44
What is possible on the web in 2026

635 views

Streamed 1 day ago

The Explainer Office
What to know about identity theft

What to know about identity theft Identity theft can drain your bank account, ruin your credit, and take months to fix. In this video ...

13:23
What to know about identity theft

5 views

6 days ago

STMicroelectronics
The quantum threat: why PQC readiness matters

Discover why the world must move to Post Quantum Cryptography (PQC) and why it cannot wait. In this video, we explain the ...

1:46
The quantum threat: why PQC readiness matters

229 views

3 days ago

Joseph Zambreno
02/24/26: Lect-05

... bitwise exor of those values who said digital logic wasn't useful for cyber security engineers do a bitwise exor of that value that's ...

42:35
02/24/26: Lect-05

32 views

2 days ago

Viper Wings
The Defense Shift NATO Doesn't Want You Talking About

"Bombardier's Toronto Plant Builds NATO's GlobalEye — 2000 Jobs, Zero Pentagon Control!" Bombardier's Toronto factory is ...

17:36
The Defense Shift NATO Doesn't Want You Talking About

149 views

6 days ago

Heapspace
Marko Babić - Guardians of the Game: Ensuring Server Integrity and Player Safety

In the high-stakes world of online gaming, server integrity and player safety are non-negotiable. This talk dives into the unseen ...

35:16
Marko Babić - Guardians of the Game: Ensuring Server Integrity and Player Safety

13 views

2 days ago

LinuxDojo - Interactive Linux Hands-on Labs
Every Hacking Tool Explained in 6 Minutes

This video explores various Linux hacking tools, categorizing them by function for effective penetration testing. We dive into ...

6:22
Every Hacking Tool Explained in 6 Minutes

9 views

5 days ago

NCERT OFFICIAL
Day 5: LMS: Security and Safety Concerns | Online Training on “Learning Management System: MOODLE”

Day 5: LMS: Security and Safety Concerns | Online Training on “Learning Management System: MOODLE” Expert -: Mr. Parveen ...

48:21
Day 5: LMS: Security and Safety Concerns | Online Training on “Learning Management System: MOODLE”

1,609 views

Streamed 6 days ago

STMicroelectronics
Teseo6 GNSS & IMU for ADAS and Robotics

Learn more about precise positioning for ADAS and robotics with Teseo6 GNSS, ASM330 IMU, and PointOneNav RTK engine.

4:07
Teseo6 GNSS & IMU for ADAS and Robotics

278 views

6 days ago