Instructional Video5:03
Curated Video

ChatGPT Voice-Powered Chatbot Build with React and FastAPI - Python and Node Version Installation Checks

Higher Ed
In this video, we will ensure that you have the correct Python and Node versions installed for your project, and we will walk you through installation checks.
<
br/>
This clip is from the chapter "Environment Setup - Frontend and...
Instructional Video3:17
Curated Video

Real-World DevOps Project From Start to Finish - Running the 'docker prune' Command Periodically Through Crontab

Higher Ed
In this video, we will discover how to automate the execution of the 'docker prune' command by setting up a cron job. By scheduling this command to run at specific intervals, we ensure that Docker resources are regularly cleaned up,...
Instructional Video3:14
Curated Video

Real-World DevOps Project From Start to Finish - Linux File Permissions

Higher Ed
This video demonstrates how to interpret and modify file permissions, manage ownership and groups, and understand special permission bits. We will have a solid understanding of Linux file permissions and be able to effectively manage...
Instructional Video2:36
Curated Video

Patterning - What comes next

Pre-K - 3rd
Guess the pattern and say what comes next
Instructional Video5:48
Curated Video

Power BI Masterclass 8 - Python, Finance, and Advanced DAX - Setting Up Our Python Environment for Power BI

Higher Ed
In this video, we will dive into setting up our Python environment tailored explicitly for Power BI. We will explore the necessary steps to seamlessly integrate Python with Power BI, installing Python, configuring the required...
Instructional Video6:51
The Guardian

Britons in the Kurdish Resistance

Pre-K - Higher Ed
As of March, 2018, more than 20 Britons had fought with the Kurdish resistance against Isis and eight had died. The Kurdish resistance invited their parents to Syria. Three fathers accepted the invitation, hoping to learn more about...
Instructional Video10:09
Curated Video

Design Effective Wordlists

Higher Ed
Learn how to effectively create wordlists that will aid you in cracking passwords
Instructional Video15:20
Curated Video

Hacking with Termux

Higher Ed
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Instructional Video2:58
Curated Video

Decode and Decompile Android Apps

Higher Ed
This is a hands on tutorial on how to reverse engineer an Android application
Instructional Video4:43
Curated Video

Linux Fundamentals - Sorting Files Using the ls Command

Higher Ed
This video demonstrates sort files using the ls command.
<
br/>
This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar and gzip utilities....
Instructional Video6:24
Curated Video

Linux Fundamentals - Sorting Contents of Files Using the Sort Utility

Higher Ed
This video demonstrates how to sort contents of files using the sort utility.
<
br/>
This clip is from the chapter "Compressing and Sorting in Linux" of the series "Linux Fundamentals".This section provides an overview of the tar...
Instructional Video5:15
Curated Video

Linux Fundamentals - Introduction to the Find Command

Higher Ed
This video provides an introduction to the find command.
<
br/>
This clip is from the chapter "Search Operations in Linux" of the series "Linux Fundamentals".This section explains the find command. You will also learn to execute the...
Instructional Video4:34
Curated Video

Linux Fundamentals - Arguments for Options

Higher Ed
This video focuses on arguments for options.
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux...
Instructional Video8:12
Curated Video

Linux Fundamentals - Command Options

Higher Ed
This video focuses on command options.
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on...
Instructional Video2:36
Curated Video

Modern Web Design with HTML5, CSS3, and JavaScript - Adding Comments in HTML

Higher Ed
This video shows how to add comments in HTML.
<
br/>
This clip is from the chapter "Creating Web Pages with HTML5" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section demonstrates how to create web pages...
Instructional Video9:36
Curated Video

Linux Fundamentals - Listing Files and Directories

Higher Ed
This video explains how to list files and directories.
<
br/>
This clip is from the chapter "Files and Directories Management in Linux" of the series "Linux Fundamentals".This section will start off with introducing you to files and...
Instructional Video9:36
Curated Video

Linux Fundamentals - Command Arguments

Higher Ed
This video focuses on command arguments.
<
br/>
This clip is from the chapter "Getting Started with Linux" of the series "Linux Fundamentals".This section will introduce you to Linux. You will start by learning how to use Linux on...
Instructional Video14:07
Curated Video

Linux Fundamentals - Changing Permissions

Higher Ed
This video demonstrates the process of changing permissions.
<
br/>
This clip is from the chapter "User Management and Permissions in Linux" of the series "Linux Fundamentals".This section explains user management in Linux. After...
Instructional Video9:28
Curated Video

AWS Certified Data Analytics Specialty 2021 – Hands-On - (Exercise) Kinesis Firehose, Part 3

Higher Ed
This video is the third part of the three-part video that explains how to build a system to populate an S3 data lake from the Amazon EC2 server data using Kinesis Firehose.
<
br/>
This clip is from the chapter "Domain 1: Collection"...
Instructional Video3:14
Curated Video

Finding the Perimeter of Squares and Rectangles

K - 5th
In this video lesson, students will learn how to find the perimeter of a square or rectangle by adding the side lengths. The teacher explains the concept clearly and provides examples to illustrate the process.
Instructional Video15:10
Virtually Passed

parallel axis theorem proof

Higher Ed
A formal proof of the parallel axis theorem. It's really useful for finding moments of inertia of composite objects and also objects which aren't rotating around the center of mass.
Instructional Video18:57
APMonitor

Data Science 🐍 Install and Overview

10th - Higher Ed
Welcome to the course on data science with Python. This course steps through basic data science and machine learning skills to analyze data and create actionable information. It address major steps of the...
Instructional Video7:01
Virtually Passed

Second Moment of Area Example 4 (I beam)

Higher Ed
Here I calculate the second moment of area (moment of inertia) for an I beam. The easiest way to do this is to find the moment of inertia of each of the rectangles about the I beams centroid (note you'll have to use the parallel axis...
Instructional Video13:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Intrusion Detection and Prevention Systems (IDS/IPS)

Higher Ed
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be...