IBM Technology

IBM Technology

Views:
36,035,339
Subscribers:
1,200,000
Videos:
1,228
Duration:
3:16:21:26
United States
United States

IBM Technology is an American content creator on YouTube with more than 1.2 million subscribers, with his content totaling approximately 36.04 million views views across roughly 1.23 thousand videos.

Created on ● Channel Link: https://www.youtube.com/channel/UCKWaEZ-_VweaEx1j62do_vQ





Top 100 Most Liked Videos by IBM Technology


Video TitleRatingCategoryGame
1.AI vs Machine Learning15,707
2.Careers in Cybersecurity12,429
3.What are Generative AI models?12,354
4.Machine Learning vs Deep Learning11,736
5.R vs Python6,574
6.Apache vs NGINX6,363
7.PostgreSQL vs MySQL5,797
8.Cybersecurity Trends for 20234,859
9.What is gRPC? (Remote Procedure Calls)4,092
10.What is Data Science?4,025
11.What are Transformers (Machine Learning Model)?3,576
12.Virtual Machine (VM) vs Docker3,345
13.GraphQL vs REST: Which is Better for APIs?3,331
14.Why Large Language Models Hallucinate3,080
15.NumPy vs Pandas2,613
16.What is Quantum Computing?2,602
17.MySQL vs MongoDB in one minute2,400
18.What is Middleware?2,400
19.Python vs Julia2,345
20.Tech Talk: What is Public Key Infrastructure (PKI)?2,156
21.What Is Apache Spark?2,152
22.Neural Networks Explained in 5 minutes2,117
23.What is Monte Carlo Simulation?2,112
24.What is LangChain?2,417
25.Cybersecurity and Zero Trust1,522
26.Cybersecurity Series: Five Principles to Follow (and One to Avoid)1,520
27.What are AI Agents?6,300
28.Data Pipelines Explained1,337
29.Supervised vs. Unsupervised Learning1,313
30.2024 Cybersecurity Trends2,966
31.Should You Use Open Source Large Language Models?2,887
32.Risks of Large Language Models (LLM)1,118
33.Data Governance Explained in 5 Minutes1,099
34.Kubernetes vs. OpenShift1,090
35.What is Data Mining?1,089
36.The most important AI trends in 20243,686
37.Relational vs. Non-Relational Databases985
38.Data Fabric Explained938
39.OLAP vs OLTP931
40.Podman vs. Docker912
41.What is Django?906
42.Lightboard Videos: How We Make Them898
43.What is a Message Queue?876
44.What is a Knowledge Graph?869
45.AI in Cybersecurity857
46.Data Governance Explained838
47.Quantum Machine Learning Explained830
48.Understanding Hackers782
49.What is Time Series Analysis?772
50.Why Implement Zero Trust763
51.The Evolution of AI: Traditional AI vs. Generative AI1,300
52.How to program a quantum computer using Qiskit735Guide
53.What is Single Sign On (SSO)732
54.What is Business Process Modeling?728
55.Artificial Intelligence: The new attack surface916
56.What is Robotic Process Automation (RPA)?708
57.Lab Tour: How IBM Develops and Tests its POWER E1080 Servers699
58.Open Source Explained694
59.Landing Your First Job in Cybersecurity692
60.What is MLOps?675
61.What are Autoencoders?669
62.Must know Python Libraries668
63.What is Prompt Tuning?658
64.How Large Language Models Work654
65.What is Random Forest?651
66.Security Operations Center (SOC) Explained646
67.What is Knowledge Management?627
68.Gradient Descent Explained624
69.4 Methods of Prompt Engineering1,032
70.Top 5 AI Myths610
71.IBM Tech Now: IBM Wazi as a Service, IBM Spectrum Sentinel, and the G2 Summer Reports606
72.Mainframe Myths Debunked in 5 Minutes605
73.Artificial Intelligence - Are We There Yet?597
74.The 7 Types of AI - And Why We Talk (Mostly) About 3 of Them1,126
75.What is a Database?580
76.Your Encryption Isn't Quantum Safe578
77.Who Are You? Identity and Access Management Really Wants to Know576
78.Identity & Access Management (IAM)569
79.DIY Machine Learning, Deep Learning, & AI projects560
80.Denial of Service Attacks Explained556
81.What Is SIEM?551
82.Cybersecurity Architecture: Roles and Tools546
83.How to make passwords more secure545
84.Social Engineering - How Bad Guys Hack Users540
85.What is Cloud Storage?537
86.Data Mining in 1 minute533
87.NLP vs NLU vs NLG531Let's Play
88.Cybersecurity Series: Fundamentals of Confidentiality, Integrity, and Availability530
89.What are MLPs (Multilayer Perceptrons)?530Let's Play
90.Ten Everyday Machine Learning Use Cases643
91.Exploratory Data Analysis524
92.What is Explainable AI?524
93.What is Data Observability?519
94.Building a Cybersecurity Framework778
95.How to Build Enterprise-Ready Foundation Models510
96.Code Generation with AI - The New (?) Programmer Tool of Choice595
97.Data Security: Protect your critical data (or else)501
98.Docker in 60 Seconds499
99.The Rise of Generative AI for Business693
100.Five Steps to Create a New AI Model490