Super User
18,263 views
0 0

Super User

Super User
Media type
5:13
Serling on Censorship

Serling on Censorship

Details
by Super User 1 month ago
in Culture
Rod Serling talks to Mike Wallace about sponsors and censorship on TV. Its amazi...
0 0
52 views
Media type
15:38
How to Break Cryptography | Infinite Series

How to Break Cryptography | Infinite Ser...

Details
by Super User 1 month ago
in Science
Only 4 steps stand between you and the secrets hidden behind RSA cryptography. F...
0 0
61 views
Media type
17:19
Transcendental numbers powered by Cantor's infinities

Transcendental numbers powered by Cantor...

Details
by Super User 1 month ago
in Science
In today's video the Mathologer sets out to give an introduction to the notoriou...
0 0
73 views
Media type
9:05
Intel: The Godfather of Modern Computers

Intel: The Godfather of Modern Computers

Details
by Super User 1 month ago
in Technology
Intel is an American multinational corporation and technology company that was f...
0 0
58 views
Media type
9:08
How To Make A Vacuum Chamber

How To Make A Vacuum Chamber

Details
by Super User 1 month ago
in Technology
This vacuum chamber can be used for degassing silicone, removing bubbles from ca...
0 0
75 views
Media type
5:28
Liquid Democracy with Santiago Siri

Liquid Democracy with Santiago Siri

Details
by Super User 1 month ago
in Culture
Support more portraits like this at: www.codingdemocracy.tv Learn more about San...
0 0
69 views
Media type
5:19
What Nuclear War Would Look Like: VICE News Tonight on HBO

What Nuclear War Would Look Like: VICE N...

Details
by Super User 1 month ago
in Culture
As Secretary of Defense under President Clinton, Bill Perry has spent most of hi...
0 0
109 views
Media type
8:53
35mm f/0.9 for $350 | Tested and Explained: Physics of Speed Booster and Crop Factoring

35mm f/0.9 for $350 | Tested and Explain...

Details
by Super User 1 month ago
in Technology
Link to the previous video: https://www.youtube.com/watch?v=p4xYA_P-bAc Jimmy Le...
0 0
98 views
Media type
10:21
SHA: Secure Hashing Algorithm - Computerphile

SHA: Secure Hashing Algorithm - Computer...

Details
by Super User 1 month ago
in Technology
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are...
0 0
89 views
Media type
21:21
Numbers Guy: Showman, scholar, savant...cashier? | Short Docs

Numbers Guy: Showman, scholar, savant......

Details
by Super User 1 month ago
in Culture
David Teitel has worked as a cashier at health food stores since the mid-1980s....
0 0
79 views
Media type
7:42
Is the European Union Worth It Or Should We End It?

Is the European Union Worth It Or Should...

Details
by Super User 1 month ago
in Culture
Should we double down or give up and go our separate ways? Support us on Patreon...
0 0
81 views
Media type
12:01
Group gives cash aid to rural Kenyans, then studies its effects

Group gives cash aid to rural Kenyans, t...

Details
by Super User 2 months ago
in Culture
Since it was founded in 2011, U.S.-based nonprofit GiveDirectly has given cash u...
0 0
86 views
Media type
9:36
UCSD Scientists Explain How They Spend NIH Funds

UCSD Scientists Explain How They Spend N...

Details
by Super User 2 months ago
in Science
President Trump’s proposed budget will cut $7 billion in NIH funding - over 20%...
0 0
94 views
Media type
4:23
How To Solve A Crime With Graph Theory

How To Solve A Crime With Graph Theory

Details
by Super User 2 months ago
in Science
Simple logic problems don't pose much of a challenge, but applying some graph th...
0 0
86 views
Media type
4:55
What Is The Factorial Of 1/2? SURPRISING (1/2)! = (√π)/2

What Is The Factorial Of 1/2? SURPRISING...

Details
by Super User 2 months ago
in Science
Type 0.5! in your calculator to see what the factorial of one-half is. The resul...
0 0
133 views
0 0
Details
2 years ago
18,263 views
828 media