Great video content! Link shim technical details are explained. I referred it on my webpage!
@pinie60528 күн бұрын
can you offer slides?
@shriramkp9292Ай бұрын
Great content, But very hard to understand the language.
@firstjedi2Ай бұрын
These idiots cannot do a speech without reading, learn english morons
@beautifulmind684Ай бұрын
good
@GH044Ай бұрын
One month to release 😍
@TheJhonycertzАй бұрын
12 años despues y es algo dificil de instalar por defecto, deberia tener una preconfiguracion funcional por defecto y luego que se pueda personalizar. asi como el frontend para hacerlo mas conocido.
@陈献Ай бұрын
there‘s no sides, why ....
@maximilian19931Ай бұрын
So most the duplicates come from DLLs or vhd holding Dlls. As the Windows system is made up of tons of them. Most of the content are copies anyway as the system stored local copies to optimise access!
AI-generated timestamps: 00:00 - 00:20 Introductory Remarks and Definition 00:20 - 01:16 Keynote Theme: Computer Science in Trouble 01:16 - 02:14 A True Story: Encounter with a Magician 02:14 - 03:40 The Value of Skepticism in Technology 03:40 - 05:00 Machine Learning: The Buzzword Phenomenon 05:00 - 06:59 Challenges of AI from a Security Perspective 06:59 - 09:01 Understanding Machine Learning: Gradient Descent Explained 09:01 - 10:50 The Problem with Hyperparameters in ML 10:50 - 12:50 Inscrutability of Machine Learning Models 12:50 - 14:30 The Dangers of AI in Critical Systems 14:30 - 16:20 The Case of Tay: AI Gone Wrong 16:20 - 18:00 The Ethical Implications of AI Decisions 18:00 - 19:50 The Need for a Holistic View of Security 19:50 - 21:30 Rethinking Security in the Age of AI 21:30 - 23:15 Conclusion: The Call for Skepticism
@abhishek-t5b3bАй бұрын
Great job on the detailed publication. It's impressive to see that you identified these issues long ago! I thought I was the first to spot the security loopholes in UPI, good to know I'm not alone. How did you approach to all the related entities for resolution? What was there response? I am trying to reach RBI through my linkedin post "UPI Security Loophole" but i see no engagement.
@knives564Ай бұрын
Great explanation and information!
@knives564Ай бұрын
Is that a bot in the comments? O.o
@orisphera2 ай бұрын
I remember seeing a video about a vulnerability found this way. It allowed for a program that gave a small chunk from the memory of each process. I remember the vulnerability name to be corebleed
@blackpinkblink7642 ай бұрын
Hey love your video!! Can you share the PPT pls
@truth-goodness-beauty2 ай бұрын
Nice Job!
@MrTweetyhack2 ай бұрын
why does he keep harping on Linux? There are other OSes out there and THEY ALL DO THE SAME ABSTRACTION.
@Douglas_Gillette2 ай бұрын
Wonderful presentation.
@MaestroCipher2 ай бұрын
Genius achievement in computer science.
@heroismist2 ай бұрын
Loved it!
@압둘하미드이드리스2 ай бұрын
thanks
@muhammadhanzalah22122 ай бұрын
Thanks. I have a presentation tomorrow of Mirai botnet Mechanism.
@nikon8002 ай бұрын
Well this is a dense talk...
@shunpillay3 ай бұрын
Awesome talk. The amount of experience on display here is amazing.
@saint20913 ай бұрын
Was Darwin /Dsoft ever adapted for hbm enabled FPGAs? These devices have many dram channels to provide high bandwidth
@NadinaHeither3 ай бұрын
Thanks for the forecast! 📊 Need some advice: 🙏 I found these words 😅. (behave today finger ski upon boy assault summer exhaust beauty stereo over). I don't know what they are. What should I do with them? 🤷♀️
@MadferitUa3 ай бұрын
Wild
@swaruppadhi13093 ай бұрын
voice not clear
@swaruppadhi13093 ай бұрын
Very poor voice, hard to make out what is being told, good work though.
@CarlaJackson-d3i3 ай бұрын
Toy Motorway
@udntknw0013 ай бұрын
Grass can pollunate fine through the air so I don't think that if there were no honeybees there'd be no beef. It'll have some impact but it doesn't have to automatically mean that it'll affect beef production.
@ansorus.3 ай бұрын
Revolutionizing
@new_contents_all_day3 ай бұрын
How do you locate the base station?
@perimiter3 ай бұрын
is there a way to do this that's more suer friendly? i'm using ansible to set up my VM and i dont want to run each command and extract UUID from it using regex.
@new_contents_all_day3 ай бұрын
The distance between base station to target can be calculated.. How do we get position of base station, also how to get the radius to draw the two focal circle
@new_contents_all_day3 ай бұрын
Where do I get the tool ?
@TobiasTernence-i3c3 ай бұрын
Martin Sandra Rodriguez Thomas Allen Larry
@gwojcieszczuk3 ай бұрын
This, in my opinion, remains the best technical talk I have ever seen. Right amount of information, context, humor. Pure class.
@KatherinBynum3 ай бұрын
Appreciate the detailed breakdown! Just a quick off-topic question: My OKX wallet holds some USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). How should I go about transferring them to Binance?
@timnewsham14 ай бұрын
"not to put too fine a point on it..." ❤
@JuvenalAlvaPerez-qz1xk4 ай бұрын
esmipapa ❤❤❤❤
@donluchitti4 ай бұрын
Tuvoc was not the first black man in an untraditional role.
@Bagunka4 ай бұрын
So cool, thank you for this presentation 🎉
@polymathx_4 ай бұрын
Priya Srikumar and Jaarul Dinker is a dream collab