Rank
Submit
Technology
My Experience with Plasma 6: A Surprisingly Stable and Improved Version
The Linux Cast
Short summary
Plasma 6 is the most stable version of KDE Plasma I have ever used, with significant improvements and few bugs.
Click to read more >
The Inspiring Journey of Figma: Revolutionizing Design Collaboration
How It Happened
Short summary
Figma is a collaborative design platform that empowers designers to go from idea to production. This video tells the inspiring story of Figma's founders, their vision to democratize creativity, and ho
Click to read more >
Jim Harbaugh's Impact on the Chargers: An Exciting New Era
NFL
Short summary
The Chargers are gearing up for a new era under Jim Harbaugh, who brings a different approach to the team. Despite losing key players, the Chargers are confident in Harbaugh's ability to lead and deve
Click to read more >
Inside the Paiste Cymbals Factory: Crafting the Sound of Music
Drumeo
Short summary
Take a journey inside the Paiste Cymbals Factory in Lucerne, Switzerland, where the world's greatest cymbals are crafted. Learn about the intricate process of creating cymbals, from pressing the bell
Click to read more >
Managing Multiple Companies and the Future of X
Zuby
Short summary
Learn how Elon Musk manages multiple companies and his vision for the future of X. Discover the challenges he faces and his plans for improving the product.
Click to read more >
Mastering the Dance: How Offensive Linemen Prepare for Elite Defensive Ends
Games With Names
Short summary
Offensive linemen study the habitual movements of elite defensive ends to prepare for their techniques and tactics. By analyzing film and studying the patterns of their opponents, linemen aim to antic
Click to read more >
The Impact of Tech Companies on Developers' Communication and Promotion
CNBC Television
Short summary
Tech companies' control over developers' communication and promotion is a major concern. The recent scrutiny by the DOJ reflects the growing recognition of this issue. The historical context of anti-c
Click to read more >
Paul George Dominates the Game with Impressive Performance
NBArtv
Short summary
Paul George leads the Clippers to victory with an incredible shooting performance and clutch plays.
Click to read more >
The Truth About the Second Amendment: Debunking Right-wing Constitutional Fallacies
Brian Tyler Cohen
Short summary
The Second Amendment does not give people the right to violently overthrow the government. It was designed to protect against insurrection and rebellion. The insurrectionist interpretation is a danger
Click to read more >
The Future of Windows: ARM and the Rise of Convertible Tablets
JuanBagnell
Short summary
Windows on ARM is gaining popularity with the launch of new laptops and convertible tablets. Microsoft, Lenovo, Asus, HP, and Dell are all competing in this space, offering devices powered by Qualcomm
Click to read more >
Unleashing the Power of RF Signals with Microcontrollers
CNLohr
Short summary
Learn how microcontrollers can send RF signals without the need for external radio chips or complex circuitry. By manipulating pin frequencies, microcontrollers can communicate with LoRaWAN gateways,
Click to read more >
How to Secure Your Wi-Fi Network and Protect Your Data
Linus Tech Tips
Short summary
Learn how to secure your Wi-Fi network to prevent unauthorized access and protect your data. Discover the importance of strong passwords, the vulnerabilities of default passwords, and the risks of usi
Click to read more >
The Marvel of Magnetic Fields: Exploring the Infinite Worlds
PBS Space Time
Short summary
Magnetic fields play a crucial role in the structure and development of the universe. They are generated by moving charged particles and can have a significant impact on the formation of stars, galaxi
Click to read more >
The Art of JSON: Mastering the Data Format for Easy Processing
Yang Bushcraft
Short summary
Learn how to use JSON for easy data processing and analysis. Discover the key insights of JSON and its wide applications. Get answers to common questions and explore timestamped summaries.
Click to read more >
Unboxing the New Tech Toy - A Comprehensive Review
Tips Unknown
Short summary
This video dives into the features and performance of the latest tech toy in the market. It covers everything you need to know, from unboxing to hands-on testing. Get a complete overview in just a few
Click to read more >
Unlocking the Power of Graphite: 3D Printing with Metal Coatings
HEN3DRIK - Electroplating 3D Prints
Short summary
Learn how to code 3D printed objects with metal using graphite paint. Avoid pitfalls and achieve great results with real metal coatings. Electroforming and plating made easy!
Click to read more >
Mastering 3D Graphics Rendering with Processing
The Coding Train
Short summary
Learn how to create impressive 3D animations using the P3D renderer in Processing, by understanding projection matrices and rotation transformations.
Click to read more >
Rust: The Language That Makes Coding Easy
Let's Get Rusty
Short summary
Rust is a programming language that simplifies coding and eliminates common mistakes. It ensures memory safety and provides efficient error handling. Rust's tooling makes it easy to build and deploy a
Click to read more >
Can I Guess the Team of the Year? | Ultimate Team Challenge
More Chuff
Short summary
In this video, I attempt to guess the players in the FIFA Team of the Year and create a team based on those players. If I get it wrong, I have to use their base versions and face a random discard for
Click to read more >
Programming a Snake Game on an Apple II Plus Computer in Apple Basic
The Coding Train
Short summary
Watch as I attempt to program a popular coding challenge, creating a snake game on an Apple II Plus computer using Apple Basic language. Follow along as I explain the steps and techniques, and witness
Click to read more >
JSON Web Tokens: A Deep Dive into Security Vulnerabilities and Exploits
The Cyber Mentor
Short summary
Learn about the security vulnerabilities and exploits associated with JSON Web Tokens (JWTs), including algorithm confusion, header injection, and more. See how attackers can exploit weak secrets and
Click to read more >
Total 5375
First
Previous
72
73
74
75
76
77
78
79
80
Next
Last