
Better than Netflix? Jellyfin on a NAS
Jellyfin’s an awesome open source home media server. In this video, Jeff Geerling shows us how he uses it to organize my movies and TV shows.
Read More
How to Safely Share Secrets: Homomorphic Encryption in Open Source Explained
Ever wondered how your data can be computed without being exposed? Sounds impossible, right? Dive into the world of Homomorphic Encryption, the groundbreaking technique that promises data privacy like never before! In this video, we’ll decode the complexities of this encryption method and explore its significance in the open-source realm. Whether you’re a cryptography enthusiast, […]
Read More
What is Quantum Artificial Intelligence
This video is from Samuel Bosch where he discusses his PhD work on Quantum Artificial Intelligence Algorithms, Shor’s Quantum Factoring Algorithm for breaking RSA Security, and the Future of Quantum Computing I talk about my PhD research at MIT in Quantum Artificial Intelligence. I also explain the basic concepts of quantum computers, and why they are […]
Read More
How to Encrypt Your DNS and STOP Your ISP SNOOPING!
This video is from Naomi Brockwell: NBTV. We presume what we search for on the internet stays private. But you might be leaking all of your internet activity through something called a DNS request. It’s possible that every site you want to visit is being collected and sold by your ISP, or monitored by countless […]
Read More
Comparing CPU, GPU, and DPU: What’s the Difference?
- Frank
- May 7, 2023
- artificial intelligence
- BlueField
- CPU
- Cybersecurity
- data decompression
- Data Streaming
- datacenter
- deep packet inspection
- DPU
- Encryption
- GPU
- granular visibility
- Infrastructure
- launchpad
- line-rate processing
- network load balancing
- networking
- NSX
- Nvidia
- NVMe over Fabrics
- precision time synchronization
- SDN
- SDS
- security isolation
- server capital costs
- server power consumption
- smartnic
- TiriasResearch
- Virtual Machines
- virtualization
- VMware
- VSPHERE
NetworkChuck was able to try out VMware vSphere on NVIDIA Bluefield DPUs. In this video, we’ll explore the insane power of these technologies through a hands-on access demo on NVIDIA LaunchPad. Learn more here: https://ntck.co/nvidialaunchpad
Read More
What is the Most PRIVATE Cloud Storage?
- Frank
- February 15, 2023
- Bitcoin
- Bitcoingirl.org
- Blockchain
- brockwell
- btc
- Cloud
- Cloud storage
- crypto
- CryptoCurrency
- currency
- drive
- e2ee
- Encryption
- End to End Encryption
- Fiat
- Girl
- mega
- monetary
- naomi
- Naomi Brockwell
- naomi privacy tips
- nbtv
- nbtv.media
- pcloud
- policy
- Privacy
- proton drive
- surveillance
- sync
- Tech
Naomi Brockwell compares some popular cloud storage providers, to see which ones are the most private.
Read More
Quantum AI Algorithms and the Future of Quantum Computing
In this video Samuel Bosch talks about his PhD research at MIT in Quantum Artificial Intelligence. He also explain the basic concepts of quantum computers, and why they are superior to conventional computers for specific tasks. Prof. Peter Shor, the inventor of Shor’s algorithm and one of the founding fathers of Quantum Computing, kindly agreed […]
Read More
Can the NSA Read Your Data on Windows?
- Frank
- June 11, 2022
- backdoor
- Encryption
- nsa
- nsakey
Why does Windows contain the NSAKEY, what is it for, and why was it inserted into Windows during Windows NT Service Pack 5?
Read More
How Dangerous are Quantum Computers?
A discussion of the potential benefits and dangers of quantum computing, security implications, and post-quantum cryptography.
Read More
How did the Enigma Machine work?
- Frank
- December 12, 2021
- 3d animation
- alan turing
- b3d
- Battery
- blender3d
- bletchley park
- bombe
- Breaking of Enigma
- Caesar Cipher
- circuit
- code breaking
- Computer
- Cryptography
- decryption
- Electricity
- Encryption
- Germans
- how it works
- index wheels
- input wheel
- keyboard
- keyboard mechanism
- lampboard
- light bulb
- machine settings
- mechansim
- Nazi
- pawl
- plugboard
- plugboard settings
- ratchet
- ratchet and pawl mechanism
- reflector
- ring setting
- rotor step
- rotors
- starting position
- typewriter
- wiring
- WW2
- WWII
This video uses 3D animation to go inside the legendary Enigma Machine, which encrypted German military secrets during World War II. Time stamps: 1:01-Encryption 2:42-Engima Machine 4:23-Simple Circuit Example 5:23-Inside the Machine 6:15-Rotors 8:51-Plugboard 10:08-Keyboard Mechanism 12:14-The Circuit 13:15-Circuit Recap 14:38-Rotor Mechanism 17:06-Machine Settings 18:14-Brilliant
Read More