1. | AI at Wimbledon, ChatGPT for coding, and scaling with AI personas | 41:28 | |
|
2. | AI and the Productivity Paradox | 39:07 | |
|
3. | AI Hardware: Training, Inference, Devices and Model Optimization | 38:25 | |
|
4. | Data Warehousing and Beyond with Netezza Performance Server | 34:38 | |
|
5. | Who Are You? Identity and Access Management Really Wants to Know | 31:15 | |
|
6. | Goldman Sachs Gen AI report, Claude 2.0 Engineer, and RIAA lawsuits | 31:15 | |
|
7. | Creating custom standard drivers in IBM Tivoli Netcool Configuration Manager | 30:13 | |
|
8. | Generative AI: A Conversation with Malcolm Gladwell & Darío Gil | 29:18 | |
|
9. | SAM 2, friend.com, and will gen AI projects be abandoned? | 28:59 | |
|
10. | IBM Operational Decision Manager on Cloud demonstration | 28:05 | |
|
11. | Cybersecurity Architecture: Networks | 27:31 | |
|
12. | Cybersecurity Modernization | 26:29 | |
|
13. | Scale your tech with a dynamic duo — AI and hybrid cloud | 22:25 | |
|
14. | The human side of HR — Fostering genuine connections with AI | 21:39 | |
|
15. | Meta's Llama 3.1, Mistral Large 2 and big interest in small models | 20:24 | |
|
16. | What Makes Large Language Models Expensive? | 19:20 | |
|
17. | Use generative AI to help save people from screaming “representative” | 18:31 | |
|
18. | Scaling AI Model Training and Inferencing Efficiently with PyTorch | 18:29 | |
|
19. | Top API Use Cases | 18:19 | |
|
20. | Cybersecurity and Zero Trust | 17:59 | |
|
21. | Cybersecurity Series: Five Principles to Follow (and One to Avoid) | 17:34 | |
|
22. | Cybersecurity Architecture: Detection | 17:10 | |
|
23. | Cybersecurity Architecture: Response | 16:57 | |
|
24. | Cybersecurity Architecture: Application Security | 16:36 | |
|
25. | What is the Identity Fabric? | 16:13 | |
|
26. | IBM Business Monitor demo | 16:11 | |
|
27. | Tekton vs. Jenkins: What's the difference? | 15:58 | |
|
28. | Edge AI vs. Distributed AI | 15:56 | |
|
29. | What is a Message Queue? | 15:38 | |
|
30. | Cyber Attack Trends: Global Identity Crisis | 15:01 | |
|
31. | Social Engineering - How Bad Guys Hack Users | 14:58 | |
|
32. | IBM Keynote at Virtual AI Summit London 2020 | 14:52 | |
|
33. | Cybersecurity Architecture: Data Security | 14:48 | |
|
34. | The Rise of Generative AI for Business | 14:44 | |
|
35. | Data Lakes in the Cloud | 14:40 | |
|
36. | Become a value creator with generative AI | 14:37 | |
|
37. | Cost of a Data Breach 2024 Trends | 14:28 | |
|
38. | What is Database Security? | 14:28 | |
|
39. | Top 5 Cloud Misconfigurations | 14:24 | |
|
40. | Data Plane vs. Control Plane | 14:22 | |
|
41. | Explained: The OWASP Top 10 for Large Language Model Applications | 14:22 | |
|
42. | Endpoints Are the IT Front Door - Guard Them | 14:22 | |
|
43. | Cybersecurity Architecture: Roles and Tools | 14:07 | |
|
44. | What are Business Rules? | 13:59 | |
|
45. | Securing Your IoT Devices | 13:54 | |
|
46. | NHS Blood and Transplant - an IBM process automation client journey | 13:49 | |
|
47. | Cybersecurity Careers FAQ | 13:46 | |
|
48. | Data Fabric Explained | 13:34 | |
|
49. | Can computers program computers? | 13:25 | |
|
50. | Hypnotized AI and Large Language Model Security | 13:21 | |
|
51. | Hybrid Cloud Architecture Part 1: Connectivity | 13:19 | |
|
52. | Hybrid Cloud Architecture Part 3: Security | 13:14 | |
|
53. | How to Secure AI Business Models | 13:13 | |
|
54. | What is Apache Iceberg? | 12:54 | |
|
55. | Audio-Jacking: Deep Faking Phone Calls | 12:51 | |
|
56. | What is Ransomware? | 12:47 | |
|
57. | Identity Fabric Explained: Success Stories and Hybrid Security Solutions | 12:41 | |
|
58. | 4 Methods of Prompt Engineering | 12:41 | |
|
59. | Cybersecurity Series: Fundamentals of Confidentiality, Integrity, and Availability | 12:34 | |
|
60. | What are AI Agents? | 12:28 | |
|
61. | Data Service Strategy for Stateful Containers | 12:24 | |
|
62. | What's the Difference Between APIs, Services and Microservices? | 12:17 | |
|
63. | What is Event Driven Architecture (EDA)? | 12:10 | |
|
64. | Benefits of Data Observability | 12:04 | |
|
65. | What is Data Observability? | 12:02 | |
|
66. | What is PyTorch? (Machine/Deep Learning) | 11:57 | |
|
67. | How PSD2 Changed the Way Banks Use APIs | 11:56 | |
|
68. | Can AI help Climate Change? | 11:56 | |
|
69. | Coder Challenge - Find the Security Bug! | 11:42 | |
|
70. | Passwordless Authentication: Weighing the Options | 11:40 | |
|
71. | Personal Disaster Quiz + Passwordless Authentication | 11:37 | |
|
72. | Is data management the secret to generative AI? | 11:36 | |
|
73. | Containerization Strategy | 11:26 | |
|
74. | Putting AI to work for Customer Service | 11:23 | |
|
75. | Hybrid Cloud Architecture Part 2: Modernize | 11:23 | |
|
76. | What is DNSSEC (Domain Name System Security Extensions)? | 11:17 | |
|
77. | Cloud Native DevOps Explained | 11:11 | |
|
78. | What is Ansible? | 11:05 | |
|
79. | Passwords vs. Passkeys - FIDO Bites Back! | 11:05 | |
|
80. | Attended vs Unattended Automation | 11:04 | |
|
81. | Developer Career Advice: Degree vs Bootcamp? | 11:03 | |
|
82. | Kubernetes Explained | 10:59 | |
|
83. | Cybersecurity Quiz. How Much Do You Know? | 10:57 | |
|
84. | How to Configure Writable LDAP in the Developer Portal | 10:57 | |
|
85. | Humans vs. AI. Who's better at Phishing? | 10:54 | |
|
86. | What is FaaS (Functions as a Service)? | 10:52 | |
|
87. | Block vs. File Storage | 10:51 | |
|
88. | Quantum Error Mitigation and the Path to Useful Quantum Computing | 10:50 | |
|
89. | How to Build Enterprise-Ready Foundation Models | 10:47 | |
|
90. | Understanding Hackers | 10:41 | |
|
91. | What is edge computing? | 10:39 | |
|
92. | Grid support in IBM Business Process Manager 8.5.7 | 10:35 | |
|
93. | 6 Observability Myths in AIOps Uncovered | 10:34 | |
|
94. | Cloud Foundry Explained | 10:31 | |
|
95. | What is Application Integration? | 10:28 | |
|
96. | Architecting a Cloud Native API Solution | 10:28 | |
|
97. | What is Object Storage? | 10:27 | |
|
98. | Blockchain Explained | 10:23 | |
|
99. | What is Enterprise Resource Planning (ERP) Software? | 10:23 | |
|
100. | Tech Talk: What's Next in Open Source | 10:22 | |
|