Hacking a Tesla
This is another demonstration of how people can hack into cars. However, just because it is possible does not mean it is practical. Look...
Understanding the Windows as a service
Servicing Windows 10: Understanding the Windows as a service process and improvements YouTube "Windows 10 makes significant changes to...
How is Linux Built?
This is an older video is a brief introduction about Linux development. Some of the statistic are out of date, notice it is from 2012....
High Sierra (10.13) New Features & Security Flaws
Security Issues ISMG, "Beware: Apple's Password Manager Has a Zero-Day Flaw, Attackers Can Steal Clear-Text Credentials From the...
Create a modern workplace with Microsoft 365
The workplace is transforming - from changing employee expectations, to more diverse and globally distributed teams, to an increasingly...
Wozniak on Technology Innovation
Shady DOM styles for custom-style Shady DOM styles for dom-template Shady DOM styles for dom-repeat Shady DOM styles for array-selector...
Windows Update for Business
Learn the best practices and guidance on how to service Windows 10 leveraging Windows Update for Business platform. In this session we...
Halt hackers: Do those tricks still work with Windows 10
Shady DOM styles for custom-style Shady DOM styles for dom-template Shady DOM styles for dom-repeat Shady DOM styles for array-selector...