Instructional Video4:51
Packt

Introduction to computer hardware and software : Chipsets

Higher Ed
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. Every CPU has specialty chips (called chipsets) that enable the CPU to interface with expansion slots, peripherals,...
Instructional Video16:25
Curated Video

Create a list : Implementing List Remove

Higher Ed
From the section: Lists. This section focuses on lists and the various functions of the list. This video demonstrates how to implement the List Remove method.
Instructional Video12:53
Curated Video

Describe network protocols : TCP Protocol

Higher Ed
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will get an overview on TCP protocol. • Learn how the connection works • Get some...
Instructional Video8:59
Packt

Compare the breadth-first and depth-first search algorithms : Recursive DFS

Higher Ed
From the section: Shortest Time Search (Depth First Search). Understand recursive DFS by answering the questions. • What is recursion • How DFS can be made recursive • How is program stack used Understand recursive DFS by answering the...
Instructional Video5:22
Curated Video

Modify a data structure : Remove Head

Higher Ed
From the section: Linked Lists. This section introduces Linked Lists and "Node" constructor functions along with Big O Notation and calculating the runtime of a function Linked Lists: Remove Head
Podcast48:18
NASA

‎Houston We Have a Podcast: How to Be a Successful Intern

Pre-K - Higher Ed
NASA interns Jaden Chambers and Leah Davis join student mentor Kelly Smith to discuss the experience of being a NASA intern and what it takes to stand out. HWHAP Episode 206.
Instructional Video2:21
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 1

Higher Ed
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Instructional Video5:59
Curated Video

Python for Network Forensics 3.4: Parsing System Logs

Higher Ed
In this video, we will experiment with correlating log entries to events encountered on the system. • Learn about system logs and how to access them • Learn to interact with the Systemd Journal with Python • Continue development by...
Instructional Video11:47
Packt

Advanced Computer Vision Projects 2.4: Finding and Reading License Plates

Higher Ed
In this video, we identify which characters do in fact belong to plates and convert them to text. • Figure out what locations are actually plates • Use k-nearest neighbors to convert images to text • View and analyze the results
Instructional Video6:15
Curated Video

High Performance Scientific Computing with C 2.4: Compiler Optimizations

Higher Ed
How can we use the compiler to automatically speed up our programs? • Learn about the basic -O optimizations • See how -Ofast-math can squeak out even better optimizations • See why -Ofast-math isn’t enabled by default
Instructional Video4:56
Curated Video

Learning D3.JS 5.0 7.6: Visualization with Scales

Higher Ed
In this video, we will learn how to use the scale, range, and domain functions in the scatter plot to dynamically present data. • Create the variables for x and y coordinates • Alternate the returning values of circles and labels • View...
Instructional Video8:46
Curated Video

Bug Bounty Program Certification 11.2: Download Reverse Engineering Tools

Higher Ed
This video focuses on the tools to perform reverse engineering tools. • Explore reverse engineering tools listing • Download dex2jar tool • Download JD-gui tool
Instructional Video5:33
Curated Video

Bug Bounty Program Certification 4.2: Setup External Network Attack

Higher Ed
In this video, we will see how to setup external wireless adapter and wireless attack. • Explore information about external wireless adapter • Connect wireless adapter to Kali Linux OS • Setup wireless attack lab
Instructional Video6:55
Curated Video

Cloud Native Development on Azure with Java 4.1: Create a Jenkins Master in Azure Using an Ubuntu Virtual Machine

Higher Ed
We will create a Jenkins master and deploy it on Azure using a new Azure virtual machine. • Deploy a new virtual machine and set up the Jenkins master server • Look for a ready-made instance with Jenkins installed and configured • Track...
Instructional Video3:30
Curated Video

Cloud Native Development on Azure with Java 2.2: Deploy a New Cosmos DB in Azure

Higher Ed
Now it’s time to take a step ahead with the TODO list we created in the previous video! We are going to connect our Java application to use Azure Cosmos DB as a backend for storing the TODO list data items. • Create a new Cosmos DB...
Instructional Video3:06
Curated Video

Learning D3.JS 5.0 3.3: Creating Texts

Higher Ed
In this video, we will learn how to create texts. • Create the text element and add some CSS properties • Create a text area • Make the text clickable
Instructional Video8:18
Packt

List computer networking media : Dial-up Connections

Higher Ed
From the section: The Internet. Here, we explore our internet options. Mike ushers in a discussion about traditional wide area network connections through dial-up networking. Phased out in most metropolitan areas, dial-up is still...
Instructional Video7:23
Packt

Introduction to computer hardware and software : RAM Features

Higher Ed
From the section: RAM. Here, we learn about RAM technology. DRAM varies in other ways, such as single-sided or double-sided DRAM. Different motherboards may or may not be able to take advantage of these features.
Instructional Video2:29
Curated Video

routing protocols : How does a router route when told conflicting information?

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How does a router route when told...
Instructional Video3:19
Curated Video

Modify a data structure : Add To Head - part 1

Higher Ed
From the section: Linked Lists. This section introduces Linked Lists and "Node" constructor functions along with Big O Notation and calculating the runtime of a function Linked Lists: Add To Head - part 1
Instructional Video2:53
Curated Video

Design test cases to verify a computer program : Introduction to this Section

Higher Ed
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python. This video provides an introduction to this section.
Instructional Video11:21
Curated Video

Create a list : The Concat Challenge

Higher Ed
From the section: Lists. This section focuses on lists and the various functions of the list. This video presents the Concat Challenge.
Instructional Video4:13
Curated Video

Describe network protocols : Introduction

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will go through an overview about this course. • Get a lower...
Instructional Video8:53
Curated Video

Describe cyber attacks that could affect a computer system or network : Hidden Scanning Ports with Nmap

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn how to scan a target with...