Packt
Structural Design Patterns in Modern C++ - Introduction to the Bridge Pattern
This video introduces the bridge pattern. This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge design pattern. You will also learn about...
Curated Video
Structural Design Patterns in Modern C++ - Adding the Shape Base Class
This video explains how to add the shape base class. This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge design pattern. You will also learn...
Curated Video
Android Security Architecture
A very important video that details the security architecture of an APK app and how it interacts with the Android platform
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Cloud HSM Overview
This video provides an overview of AWS CloudHSM. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about Amazon Web Services (AWS)...
Curated Video
Configuration management control
In this video, we will be discussing the importance of configuration management control in software development. Configuration management control is the process of identifying, organizing, and controlling changes to software and hardware...
Zach Star
Physics Vs Electrical Engineering - How to Pick the Right Major
The undergraduate curriculum for physics and electrical engineering have some similarities that students may not be aware of. With both majors you get to see circuits, basics physics concepts, and even electromagnetic waves. Physics...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Third-Party Risk Management
Some business activities cannot be completed entirely within an organization and must be outsourced. Ensuring that proper security safeguards are in place throughout the hardware, software, and personnel supply chain results in a...
Zach Star
Are Engineering Jobs 'Hands On'?
In this video I discuss whether jobs in engineering are hands on, more computer work, or in the field. Some people might have the wrong image of an engineering job which may cause confusion down the road. The good news is that engineers...
ShortCutsTv
Foetal Susceptibility and the Dutch Winter Famine
Obesity and the health problems it brings with has long been seen as a product of genetic predisposition and bad life style choices. But the foetal susceptibility hypothesis introduces another cause, the nourishment an embryo receives...
Zach Star
How Much do Engineers and Scientists Make? Salary and Employment Statistics
Two common statistics that are helpful to know about any college major are: how much money you can expect to make, and the amount of job opportunities. Here I outline the statistics for many of the most majors and careers when it comes...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Embedded Systems
Embedded systems use an operating system burned into one or more chips and have a defined function, such as running an elevator or proving Wi-Fi services. In this episode, Industrial Control Systems, Internet of Things (IoT), Raspberry...
Physics Girl
How We’ll Find the Aliens in Our Solar System! | STELLAR
I got to visit two awesome upcoming NASA missions searching for life in our solar system! The Mars 2020 rover mission targeting the Jezero Crater and the Europa Clipper reconnaissance mission to explore one of Jupiter's moons due to...
Programming Electronics Academy
Hardware Overview: Arduino Course 2.6
A look at the Arduino circuit board and its prominent features.
TMW Media
Robotics Challenges for the Future: Comparing humans and robots
What is DARPA? How are robots and a one year old child similar and different? What will robots be like in the future?
Robotics Challenges for the Future, Part 1
Programming Electronics Academy
Prototyping Incremental Design: Arduino Course 1.4
A description of the incremental design process and why and how it should be used.
Brainwaves Video Anthology
Ruben Puentedura - Rethinking Educational Technology
Dr. Ruben Puentedura is the Founder and President of Hippasus, a consulting firm based in Western Massachusetts, focusing on transformative applications of information technologies to education. He has implemented these approaches for...
Zach Star
Computer Science Vs Computer Engineering - How to Pick the Right Major
In this video I discuss computer science vs computer engineering. Computer science and computer engineering have many similarities but also some big differences. Computer science majors learn more about software while computer engineers...
NASA
The Invisible Network: 22. LCRD - The Future | NASA's The Invisible Network Podcast
In this final episode of a five-part series about NASA’s Laser Communications Relay Demonstration, we look at the future of optical communications technologies at NASA.
APMonitor
LSTM Replaces MIMO MPC
Model Predictive Control (MPC) is applied online with real-time optimizers that coordinate control moves. This case study demonstrates training and replacement of the MPC with an LSTM network. Two prior case studies demonstrate this same...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Driver and Overflow Attacks
Malicious actors can trick victims into installing malicious code such as driver shims. Software programming flaws related to memory allocation can result in security threats. Secure coding, patching, and user awareness go a long way in...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Next Animation Studio
Bitcoin mining usage may consume 0.5% of world's electricity
New research posits that Bitcoin mining will consume half a percent of the world's total electricity by the end of 2018, then 5 percent in a few years.