ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

47 results

Awesome
Write code good enough to deploy rockets

NASA's top 10 rules for writing good software. Topics: - Coding best practices; - NASA rules for safe code; - Simple control flow; ...

8:22
Write code good enough to deploy rockets

10,745 views

13 hours ago

Coding Tech
You're Using TypeScript Wrong (7 Patterns to Avoid)

TypeScript just became the #1 programming language on GitHub, but most developers are still making these critical mistakes that ...

13:03
You're Using TypeScript Wrong (7 Patterns to Avoid)

2,172 views

4 days ago

Awesome
OWASP top 10 Explained

An overview of OWASP top 10 security flaws in 2025 Topics: - Broken access control; - Security misconfiguration; - Supply ...

10:15
OWASP top 10 Explained

11,734 views

7 days ago

Consultants Like Us
ISO 27001:2022 - A8.28 – Secure Coding

ISO27001 A8.28 – WHY ONE LINE OF BAD CODE CAN DESTROY TRUST, REPUTATIONS… AND LIVES** Every application ...

19:53
ISO 27001:2022 - A8.28 – Secure Coding

0 views

6 days ago

ALL ABOUT VLSI
Hamming Code Encoder & Decoder in Verilog | Code Development & Testbench | Part 2

If you want to strengthen your digital design, Verilog coding, and error control coding concepts, this project is highly recommended ...

18:47
Hamming Code Encoder & Decoder in Verilog | Code Development & Testbench | Part 2

88 views

2 days ago

4G Silver Academy தமிழ்
Operators in C in Tamil | Computer Programming C in Tamil | CS25C01 in Tamil
7:33
Operators in C in Tamil | Computer Programming C in Tamil | CS25C01 in Tamil

41,183 views

2 days ago

Code Deep Dive
Episode 11 - PyTorch Module forward

Unveil the inner workings of forward in a PyTorch nn.Module. In this episode we'll walk through: * Call‑wrapper logistics – why a ...

9:04
Episode 11 - PyTorch Module forward

52 views

5 days ago

EverydayITwithDJ
How CISSP Thinks About Secure Software (Not Coding) | CISSP Domain 8

cissp #softwaredevelopment #securecoding Welcome to Domain 8 of the CISSP Masterclass Crash Course — Software ...

12:46
How CISSP Thinks About Secure Software (Not Coding) | CISSP Domain 8

2 views

2 hours ago

Ethical Programmer
This Tool Makes Discord Bot Development 10x Easier (DiscoBase)

In this video, I show you how to build advanced Discord bot systems using DiscoBase in a clean and scalable way. We go step by ...

14:41
This Tool Makes Discord Bot Development 10x Easier (DiscoBase)

582 views

6 days ago

TeachSmart AI Academy
Python for Beginners - Lesson 15: Error Handling (Fortifying Your Code)

What happens when your perfect code meets unexpected user input? It crashes. In Lesson 15 of our Python for Beginners course, ...

5:43
Python for Beginners - Lesson 15: Error Handling (Fortifying Your Code)

0 views

1 day ago

Stuart Barker
ISO 27001 Annex A 8.28 Secure Coding - Strategic Implementation Briefing [Auditor Explained]

In this beginner's guide to ISO 27001 Annex A 8.28 Secure Coding, ISO 27001 Lead Auditor Stuart Barker and his team talk you ...

5:49
ISO 27001 Annex A 8.28 Secure Coding - Strategic Implementation Briefing [Auditor Explained]

23 views

4 days ago

Michał Barczak
A NEW PROFESSION has emerged with no competition (YET!) Earnings up to 30,000! | Michał Barczak (...

👉 Choose a VPS from Hostinger (e.g., under n8n) and use this link: https://www.hostg.xyz/SHISp Discount code: GEEKWORK Chats ...

11:40
A NEW PROFESSION has emerged with no competition (YET!) Earnings up to 30,000! | Michał Barczak (...

4,614 views

3 days ago

Sudheendra S G
06_debugging and fixing errors in a plane simulator

00:00 Intro: Session 6 Challenge Setup 00:37 Plane problems overview (backwards, no steering, too fast) 02:17 What the final ...

17:09
06_debugging and fixing errors in a plane simulator

8 views

5 days ago

SOCDemystified
OWASP A01:2025 | CWE-200 Explained | Information Exposure & Broken Access Control

A01:2025 – CWE-200 Explained | Information Exposure (Release Candidate) CWE-200 (Exposure of Sensitive Information to an ...

5:31
OWASP A01:2025 | CWE-200 Explained | Information Exposure & Broken Access Control

10 views

7 days ago

Mark Jivko
The worst devlog | How a 2 months project took me 2 years to launch

I don't publish devlogs too often. But when I do, they're 2 years later. #devlog This is the short story of how I built ...

9:48
The worst devlog | How a 2 months project took me 2 years to launch

1,410 views

6 days ago

AKM Explained
A Beginner’s Guide to Programming Languages

Programming can feel confusing at first — too many languages, too many opinions, and no clear place to start. This video breaks ...

18:42
A Beginner’s Guide to Programming Languages

59 views

7 days ago

Stuart Barker
ISO 27001 Annex A 8.26 Application Security Requirements | The Lead Auditor Podcast

In this episode: Lead Auditor Stuart Barker and team do a deep dive into the ISO 27001:2022 Annex A 8.26 Application Security ...

13:35
ISO 27001 Annex A 8.26 Application Security Requirements | The Lead Auditor Podcast

12 views

2 days ago

AICodeKing
Gemini 3.0 Flash (Agentic Tests w/ Antigravity & CLI): In-depth agentic test of Gemini 3 Flash.

In this video, I put Google's new Gemini 3 Flash through real-world agentic benchmarks—building apps with both Gemini CLI and ...

8:08
Gemini 3.0 Flash (Agentic Tests w/ Antigravity & CLI): In-depth agentic test of Gemini 3 Flash.

9,552 views

5 days ago

Accounting Insights
Preview your month-end journals in Power BI

Preview Your Month-End Journals in Power BI | Speed Up Your Month-End Close Transform your month-end process by ...

4:31
Preview your month-end journals in Power BI

42 views

6 days ago

Brendon Shultz
Coding Out Airbag Warnings After Recaro Seat Install on my Porsche 911

In this video, I walk through coding out the airbag warnings on my 2005 Porsche 911 after installing Recaro seats that don't have ...

4:03
Coding Out Airbag Warnings After Recaro Seat Install on my Porsche 911

1,032 views

4 days ago

Learn IT Free: Careers & Tech with Vi-2s-Dk
BEST CRASH Course: Python for HACKERS & Cybersecurity Professionals!

Welcome to Module 5—the module that will transform you from a basic analyst into a powerful automation engineer! Python is the ...

18:09
BEST CRASH Course: Python for HACKERS & Cybersecurity Professionals!

119 views

7 days ago

CYFI
While Loop in Python Explained | For vs While Loop | Block to Python

In the previous video, we learned about loops in Python and explored the for loop. In this video, we move to the next important ...

8:51
While Loop in Python Explained | For vs While Loop | Block to Python

6 views

6 days ago

All Success Path
VBA MCQs - Part 2 | Visual Basic for Applications  | Multiple-Choice Questions & Answers

VBA MCQs - Part 2 | Visual Basic for Applications | Multiple-Choice Questions & Answers https://www.allsuccesspath.com/ Want to ...

6:34
VBA MCQs - Part 2 | Visual Basic for Applications | Multiple-Choice Questions & Answers

0 views

12 hours ago

T&T Automation
B1. Mitsu FR-E70 inverter, signal connection, reset to default, set basic parameters, Motor.

T&T AUTOMATION - INDUSTRIAL ELECTRICAL AND AUTOMATION TRAINING CENTER Address: Le Trong Tan Street, Duong Noi, Ha Dong, Hanoi ...

15:17
B1. Mitsu FR-E70 inverter, signal connection, reset to default, set basic parameters, Motor.

49 views

6 days ago

ARHAAN AUTOMOBILE
P183F Immobilizer not present in vehicle!!P1832 Immobilizer authentication error!!P183B,B0044!!#900k

P183F Immobilizer not present in vehicle!!P1832 Immobilizer authentication error!!P183B,B0044!!#900k Mo.7485925985 P183F ...

8:17
P183F Immobilizer not present in vehicle!!P1832 Immobilizer authentication error!!P183B,B0044!!#900k

0 views

6 hours ago