IBM Technology

IBM Technology

Views:
37,098,332
Subscribers:
1,320,000
Videos:
1,303
Duration:
3:16:21:26
United States
United States

IBM Technology is an American content creator on YouTube with more than 1.32 million subscribers, with his content totaling approximately 37.1 million views views across roughly 1.3 thousand videos.

Created on ● Channel Link: https://www.youtube.com/channel/UCKWaEZ-_VweaEx1j62do_vQ





Top 200 Most Liked Videos by IBM Technology


Video TitleRatingCategoryGame
101.Audio-Jacking: Deep Faking Phone Calls649
102.Cybersecurity Architecture: Networks489
103.Cyber Attack Trends: Global Identity Crisis620
104.How Chatbots Could Be 'Hacked' by Corpus Poisoning484
105.What is Podman? How is it Different Than Docker?483
106.Passwordless Authentication: Weighing the Options556
107.What is Computational Storage?469
108.Python Loves the Mainframe and Data Science447
109.Business Process Analysis444
110.Why a Data Lakehouse Architecture435
111.Developer Career Advice: Degree vs Bootcamp?434
112.What is In-Memory Computing?427
113.AI vs Machine Learning: What's the difference?426
114.What is Ransomware?424
115.NumPy vs SciPy413
116.Large Language Models Are Zero Shot Reasoners406
117.No-Code Explained in 3 Minutes403
118.What is MySQL?403
119.What is an RBM (Restricted Boltzmann Machine)?398
120.What is Back Propagation392
121.What is Phishing391
122.The Anatomy of an Attack391
123.Why foundation models are a paradigm shift for AI531
124.FIDO Promises a Life Without Passwords9,697
125.What is XaaS?429
126.What is Endpoint Detection and Response (EDR)?378
127.What is Synthetic Data? No, It's Not "Fake" Data377
128.Breaking legacy programs into microservices without breaking anything372
129.8 Use Cases for Artificial General Intelligence (AGI)550
130.What is Malware? Let's Hear the Hacker's Viewpoint370
131.IBM Tech Now: IBM Cloud Prep, the IBM Consulting Cloud Accelerator, and the Gartner Magic Quadrant365
132.XDR (Extended Detection & Response) Explained363
133.What Makes Large Language Models Expensive?1,375
134.Data Lakehouses Explained361
135.Cybersecurity Architecture: Application Security359
136.What is Quantum Safe?358
137.Why Secure DNS is Important357
138.Why Do Devs Love Python?355
139.What is GraphQL?354
140.Fluid vs. Crystallized Intelligence344
141.Cybersecurity Quiz. How Much Do You Know?505
142.Cybersecurity Threat Hunting Explained342
143.Artificial Intelligence vs. Augmented Intelligence342
144.What is a Vector Database?645
145.How to Pick the Right AI Foundation Model467
146.What are Jupyter Notebooks?329
147.Cybersecurity Modernization329
148.Machine Learning vs. Deep Learning vs. Foundation Models327
149.Devs Don't Need Admin Access - Lessons Learned327
150.Endpoints Are the IT Front Door - Guard Them325
151.Data Analytics vs Data Science685
152.Top 5 Cloud Misconfigurations403
153.Optical Character Recognition (OCR)318
154.What is Text Mining?317
155.What is Multi-Factor Authentication317
156.What is the MERN Stack?316
157.Large Language Models: How Large is Large Enough?421
158.Become a value creator with generative AI558
159.Why you need Privileged Account Management311
160.Large Language ModelOperations (LLMOps) Explained377
161.Generative vs Rules-Based Chatbots304
162.What is the CIA Triad303
163.Unboxing Power E1080 server301
164.Using Retrieval Augmented Generation with a Large Language Model AI Chatbot328
165.LAMP Stack Explained in 3 Minutes289
166.Cybersecurity Architecture: Response288
167.Explained: The OWASP Top 10 for Large Language Model Applications286
168.Cybersecurity Architecture: Data Security285
169.What is Master Data Management285
170.No-Code vs Low-Code283
171.Passwords vs. Passkeys - FIDO Bites Back!563
172.Protecting Yourself from Ransomware280Guide
173.Data Quality Explained278
174.SRE Golden Signals Explained275
175.Why Linear regression for Machine Learning?382
176.Training AI Models with Federated Learning272
177.Humans vs. AI: who makes the best decisions?271
178.Cybersecurity Careers FAQ269
179.Do Chatbots Need AI?267
180.Humans vs. AI. Who's better at Phishing?336
181.What is SOAR (Security, Orchestration, Automation & Response)265
182.Will AI Help or Hurt Cybersecurity? Definitely!265
183.What is Shadow IT?263
184.Kubernetes Operators Explained263
185.What is TensorFlow?377
186.Don't Let Your Phone Get Juice Jacked!260
187.Cybersecurity Architecture: Detection259
188.Transactional vs. Analytical Workloads258
189.The History of Chatbots256
190.What is Retrieval-Augmented Generation (RAG)?255
191.What tech topics are YOU interested in?253
192.What is Conversational AI?251
193.Security Role Management Best Practices251
194.Securing Your IoT Devices250
195.AI Systems vs Traditional Coding597
196.Cost of a Data Breach 2024 Trends317
197.How to Add AI to Your Apps Faster with Embedded AI245Guide
198.Machine Learning Basics: Supervised v Unsupervised243
199.Containers vs Pods474
200.What is ASM (Attack Surface Management)?242