Instructional Video5:40
Curated Video

Describe network protocols : The Course Overview

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. This video will give you an overview about the course.
Instructional Video9:53
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Code to perform corner detection

Higher Ed
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision. Computer Vision Basics: Part 3: [Activity] Code to perform corner detection
Instructional Video31:40
Curated Video

Microsoft SQL Server Development for Everyone - Creating an SQL Database Table

Higher Ed
This video demonstrates how to create an SQL database table. This clip is from the chapter "Manipulating Tables and Data" of the series "Microsoft SQL Server Development for Everyone".This section explains how to manipulate tables and data.
Instructional Video4:51
Packt

Introduction to computer hardware and software : Primary PC Components

Higher Ed
From the section: The Visible Computer. In this section, we learn more about primary PC computer, external connections and learn more about computer. Mike takes you on a tour of the primary PC components including the computer case,...
Instructional Video6:07
Curated Video

Ensemble Machine Learning Techniques 3.4: Random Forest

Higher Ed
This video aims to teach the viewer about a versatile and powerful algorithm called Random Forest. • We discuss what is Random Forest • We see the difference between Bagging Trees and Random Forest • We look at the advantages and...
Instructional Video9:29
Curated Video

Python for Network Forensics 1.2: Learning Dshell

Higher Ed
In this video, we will learn how to inspect network traffic at the packet level using Dshell. • Learn to set up a Python virtual environment • Learn to import packet capture • Use Dshell decoders to fuller analyze automate network traffic
Instructional Video5:53
Curated Video

Java 11 Programming for Beginners 4.3: Working with Strings, Characters, and Regular Expressions

Higher Ed
Strings and regular expressions are key to everyday Java programming. This video gives an overview of how to use them. • Three slides to explain string and regular expression • Use regex in code to split a word • Use string functions to...
Instructional Video7:02
Curated Video

Mastering Tableau 2018.1, Second Edition 11.3: Design Tricks for Great Dashboards

Higher Ed
Some tricks to create great dashboards. • Steps to create a great design • Creating a great design in Tableau
Instructional Video9:04
Curated Video

Mastering Tableau 2018.1, Second Edition 6.2: Working with Sets

Higher Ed
In this video, we’ll work with sets. • The difference between groups and sets • Understand different types of sets • Implement different types of sets
Instructional Video8:55
Curated Video

Mastering Tableau 2018.1, Second Edition 5.9: Working with Sorting and Nested Sorting

Higher Ed
In this video, we’ll see sorts over data. • Understand the importance of sort • Apply sort over the data
Instructional Video5:18
Curated Video

Mastering Tableau 2018.1, Second Edition 4.3: Combining Your Data with Union

Higher Ed
In this video, we’ll see how we can combine data with the help of Union. • Understand Union • Combine tables using Union
Instructional Video5:04
Curated Video

Mastering Tableau 2018.1, Second Edition 2.3: Saving Data Sources and Workbooks, Live, or Extracts

Higher Ed
In this video, we’ll see how to save data sources and workbooks. • Understand the different types of workbooks and data sources • The difference between Extract connection and Live connection
Instructional Video6:37
Curated Video

Mastering Tableau 2018.1, Second Edition 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Instructional Video3:20
Curated Video

Learning D3.JS 5.0 3.5: Creating Clip Paths

Higher Ed
In this video, we will learn how to create clip paths. • Write a text path and • Write the and the • Connect everything and view the result
Instructional Video6:34
Curated Video

Bug Bounty Program Certification 5.1: About Network Internal Attack on Server

Higher Ed
In this video, explore various network internal attacks. • Learn about network internal attack and listing of attacks • Explore DOS attack and password cracking techniques • Understand server scanning techniques
Instructional Video2:52
Curated Video

routing protocols : Classful routing protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Classful routing protocols
Instructional Video0:33
Curated Video

routing protocols : Additional AD values

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Additional AD values
Instructional Video5:51
Packt

List computer networking media : What is half duplex and full duplex?

Higher Ed
From the section: Cabling and Packet Flows (ICND1). This Section is about Cabling and Packet Flows. This includes lectures on Ethernet history, 10base2, MAC addresses, MAC Addresses, CSMA/CD and lot more. Cabling and Packet Flows...
Instructional Video4:19
Curated Video

Import external packages or libraries : Installing 3rd Party Packages

Higher Ed
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python Python has one of the largest 3rd party ecosystems in the world. If you need something...
Instructional Video6:56
Curated Video

Modify a data structure : Add To Head - part 2

Higher Ed
From the section: Linked Lists. This section introduces Linked Lists and "Node" constructor functions along with Big O Notation and calculating the runtime of a function Linked Lists: Add To Head - part 2
Instructional Video7:40
Curated Video

Describe cyber attacks that could affect a computer system or network : Scanning the Network with OpenVas

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know how to find vulnerabilities...
Instructional Video6:27
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Practical Example - Vehicle Speed Determination

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Practical Example - Vehicle Speed Determination
Instructional Video3:27
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Find a truck in an image manually!

Higher Ed
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision. Computer Vision Basics: Part 3: [Activity] Find a truck in an image manually!
Instructional Video15:49
Curated Video

Creating a Painting by Numbers Tool in Microsoft Excel

Pre-K - Higher Ed
In this video tutorial, learn how to create a painting by numbers tool in Microsoft Excel using conditional formatting. By assigning colors to specific numbers and applying conditional formatting rules, you can transform a grid of...