41:59
Al Sweigart, "Automating Your Browser and Desktop Apps", PyBay2016
SF Python
12:39
React Native For Everyone #3 - Android Setup & Emulation
Syntax
33:31
"You can be a kernel hacker!" by Julia Evans
Strange Loop Conference
36:36
"Systems programming as a swiss army knife" by Julia Evans
5:58
Understanding the Liskov Substitution Principle
edutechional
52:05
Raymond Hettinger - Beyond PEP 8 -- Best practices for beautiful intelligible code - PyCon 2015
PyCon 2015
15:22
FreeBSD - Network setup (ipv4)
BSDtutorial
17:55
How the C++ Compiler Works
The Cherno
26:25
Lecture 1 - IP Multicast Basics and Addressing
Decoding Packets
20:00
Essentials: Pointer Power! - Computerphile
Computerphile
8:28
Triple Ref Pointers - Computerphile
12:24
Reason for ARM (Acorn Archimedes at 30) - Computerphile
8:18
Internationalis(z)ing Code - Computerphile
19:55
The Great 202 Jailbreak - Computerphile
8:59
"Code" Books (Prof Brian Kernighan) - Computerphile
11:31
Where did Bytes Come From? - Computerphile
8:42
Colossus & Bletchley Park - Computerphile
30:04
Power Use of UNIX • Dan North • GOTO 2013
GOTO Conferences
9:33
Ansible - A Beginner's Tutorial, Part 1
Ben's IT Lessons
1:40:09
Ansible for the Windows Admin by Jeremy Murrah
PowerShell.org
9:20
How Secure Shell Works (SSH) - Computerphile
23:29
Manipulating Objects in Microsoft PowerShell - Video 2
Shane Young
8:50
I Left my Job at Google - Here's Why
Clément Mihailescu
LIVE
[Private video]