Instructional Video17:08
Zach Star

The applications of non-euclidean distance | Metric Spaces

12th - Higher Ed
The applications of non-euclidean distance | Metric Spaces
Instructional Video8:18
Why U

Topology - Part 2

12th - Higher Ed
A humorous look at the topology of curved space.
Instructional Video14:50
Why U

Topology - Part 3

12th - Higher Ed
A humorous look at the topology of curved space.
Instructional Video14:58
Why U

Topology - Part 1

12th - Higher Ed
A humorous look at the topology of curved space.
Instructional Video22:20
Curated Video

Introduction to IT and Cybersecurity: Essentials of Networking

Higher Ed
Part 2/16 of Introduction to IT and Cybersecurity series: This video is an introductory lesson on networking essentials. The presenter first defines various communication terminologies used in networking, and explains devices such as...
Instructional Video17:15
Curated Video

03 Why Power Electronics

Higher Ed
Power Electronics course - Walid Issa
Instructional Video8:24
Curated Video

routing protocols : Types of Routing Protocols -Distance Vector, Link State

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Types of Routing Protocols -Distance...
Instructional Video1:13
Packt

Data transmission : Physical versus logical topology

Higher Ed
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc. Introduction to Computer Networks (ICND1): Physical versus...
Instructional Video9:32
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Caution with States

Higher Ed
In this lecture, we will try to understand the need for repartitioning your Kafka Stream and also learn a method for doing the same. This clip is from the chapter "States and Stores" of the series "Apache Kafka - Real-time Stream...
Instructional Video13:12
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Kafka Streams API - Quick Start

Higher Ed
This lecture helps you create your first Kafka Streams Application. The example is the simplest streaming application. However, it helps you understand the basic API structure and its usage. This clip is from the chapter "Enter the...
Instructional Video8:39
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - How to test a Stream Processing Application

Higher Ed
This video is about how to test a Stream Processing Application. This clip is from the chapter "Testing Streams Application" of the series "Apache Kafka - Real-time Stream Processing (Master Class)".This section is about Streams...
Instructional Video16:03
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Creating Streams Topology

Higher Ed
In this lecture, you will learn the notion of the Topology in more detail. We will also explore some available transformation methods that we can use to create a processor topology. Further, we will take a fairly complex business...
Instructional Video14:44
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Implementing Streams Topology

Higher Ed
In this lecture, we will implement a complex Streams Topology that we designed in the earlier lecture. This clip is from the chapter "Enter the Stream Processing" of the series "Apache Kafka - Real-time Stream Processing (Master...
Instructional Video4:27
Curated Video

routing protocols : Benefits of link state routing and Drawbacks of link state routing

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Benefits of link state routing and...
Instructional Video6:34
Curated Video

Explain web security : What is Reconnaissance?

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Instructional Video7:58
Curated Video

CISSP®- Risk Management - Assessment Part 2

Higher Ed
This is the second part of a two-part video that shows how to assess and manage risks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video3:32
Curated Video

routing protocols : How do routers determine the best route?

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How do routers determine the best route?
Instructional Video3:02
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Section Summary and References "Enter the Stream Processing"

Higher Ed
In this lecture we will summarize everything that we learned in this section This clip is from the chapter "Enter the Stream Processing" of the series "Apache Kafka - Real-time Stream Processing (Master Class)".This section is about...
Instructional Video9:04
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Unit Testing Your Topology

Higher Ed
This video is about Unit testing your topology This clip is from the chapter "Testing Streams Application" of the series "Apache Kafka - Real-time Stream Processing (Master Class)".This section is about Streams Application.
Instructional Video5:19
Curated Video

routing protocols : Static vs. Dynamic Routing

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Static vs. Dynamic Routing
Instructional Video9:30
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Kafka Streams Architecture

Higher Ed
In this lecture, we will try to understand how Kafka Streams works underneath the covers to provide parallel processing and talk about following items such as Multi-threading in Kafka Streams, Multiple Instances of Streams Application,...
Instructional Video2:37
Zach Star

3 Google Hacks for Students

12th - Higher Ed
In this video I go over 3 google hacks for students (especially college students). As a student you want the quickest ways to find notes, exams, textbooks, research information, and anything to optimize your time. The search hacks in...
Instructional Video7:11
Curated Video

routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
Instructional Video14:28
Curated Video

CISSP®- International Agreements and Guidelines

Higher Ed
This video highlights the international agreements and guidelines. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...