

How is Linux Built?
This is an older video is a brief introduction about Linux development. Some of the statistic are out of date, notice it is from 2012....


Microsoft Ignite 2017 Keynote
Satya Nadella, CEO Microsoft, oversees all aspects of Microsoft business and leadership--from cloud and mobile development to digital and...


Windows Pen and Ink - How it works
This is a session from MS Ignite conference. Description "With the power of Windows Ink you can now add the ability to integrate the use...

Threat Modeling
Application Security is vital, it is not enough to implement firewalls and anti-virus. Applications need to be protected and one of the...