NASA
NASA in Silicon Valley: Jeremy Frank Talks About How Automated Technology Will Help Humans Reach Mars
A conversation with Jeremy Frank, Principle Investigator for the Autonomous Systems and Operations Project at NASA’s Ames Research Center in Silicon Valley.
NASA
Small Steps, Giant Leaps: Episode 69, Parker Solar Probe Small Steps, Giant Leaps
Parker Solar Probe Mission Scientist Adam Szabo discusses NASA's journey to the Sun.
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Backdoor Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Curated Video
routing protocols : OSPF Hierarchy - Multiple areas
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: OSPF Hierarchy - Multiple areas
Curated Video
Explain web security : What is Reconnaissance?
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 2
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 2
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Packt
Compare the breadth-first and depth-first search algorithms : Graph Data Structure
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and graph...
Curated Video
Call a function : Demo - String Operations
From the section: Data Operations. In this section, you will learn about the different types of operators used in Python. This section will teach you the building blocks for any kind of operations in Python. Data Operations: Demo -...
Packt
Introduction to computer hardware and software : USB Standards
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. The Universal Serial Bus (USB) interface is the main peripheral interface these days. Make...
Curated Video
Describe the different types of malware that could affect a computer system or network : Backdoors
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Packt
Describe a data structure : What Are Data Structures and Why Are They Important?
From the section: Introduction to Data Structures and Important Concepts. This section introduces Data Structures and important concepts of DS and explains why they are important Introduction to Data Structures and Important Concepts:...
Zach Star
What does a Physics Major do? (Part 2 Research and Career Examples)
Our part 2 video of "What does a physics major do" covers what research positions and jobs a physics major could go into. In the video I focus mostly on jobs that directly apply to physics. What you'll find is that there are an endless...
Zach Star
Python Programming - What You'll Learn In an Introductory Course
Python Programming - What You'll Learn In an Introductory Course
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Mediacorp
Navigating the Dangers of Online Vigilantism: A Case Study
This video discusses the issue of online vigilantism in Singapore, focusing on two specific cases: SMRT feedback and Roads dot SG. It explores the potential dangers and consequences of individuals taking matters into their own hands...
Institute for New Economic Thinking
Yvo Desmedt: Much Ado About Cyber Security
Private data is leaked more and more in our society. Wikileaks, Facebook, and identity theft are just three examples. Network defenses are constantly under attack from cyber criminals, organized hacktivists, and even disgruntled...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Attacks on Classification and How They Work
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to describe why adversarial attacks occur and how...
Packt
Explain the negative impacts of artificial intelligence systems on society : Comparing Metrics and Choosing the Best Attack
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Packt
Explain the negative impacts of artificial intelligence systems on society : PGD Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Curated Video
Test a computer program or algorithm : The On-success Block and Re-raising Exceptions
From the section: Errors in Python. This section introduces you to errors in Python. This video explains the concept of on-success block and re-raising exceptions in Python.
Curated Video
Test a computer program or algorithm : Dealing with Python Errors
From the section: Errors in Python. This section introduces you to errors in Python. This video shows how to deal with Python errors.
Curated Video
Implement a computer program using a classic algorithm : Project handoff: Bringing it together
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Design and build a project that utilizes the algorithms and tools that have been...