Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacking Tor - The End-to-End Correlation Hack
This video will discuss a significant attack on Tor, the end-to-end correlation attack.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Tor
In this video, the author talks about a popular anonymity tool called Tor, the most powerful tool available to provide anonymity on the Internet.
Astrum
How the Moon Will Change Earth in the Next Decade
The catastrophic effects of the ‘Lunar Nodal Cycle’.
Science ABC
Lymphatic System Explained In Simple Words
The lymphatic system consists of a complex network of lymphatic vessels, glands or nodes, and organs, such as the spleen and thymus, extending throughout the body. Through it flows a fluid called lymph. The lymphatic system has three...
Curated Video
Git and GitHub Masterclass - The Practical Bootcamp - Resources (Important)
This video explains where you can find the various resources, links, cheat sheets, and interview questions associated with the course. This clip is from the chapter "Course Introduction" of the series "Git and GitHub Masterclass - The...
Curated Video
Modern JavaScript from the Beginning - Second Edition - Traversing the DOM - All Nodes
This video covers how to traverse the entire DOM, including text nodes and comment nodes. It covers the firstNode, lastNode, nextNode, and previousNode properties. This clip is from the chapter "DOM Manipulation" of the series "Modern...
Curated Video
Modern JavaScript from the Beginning - Second Edition - Traversing the DOM - Elements
This video covers how to traverse the DOM to access child elements, parent elements, and sibling elements. It covers the firstChild, lastChild, nextSibling, and previousSibling properties. This clip is from the chapter "DOM Manipulation"...
Curated Video
Machine Learning: Random Forest with Python from Scratch - Information Gain
In this video, we will define columns for questioning and determine how much information can be gained by splitting a column. This clip is from the chapter "Random Forest Step-by-Step" of the series "Machine Learning: Random Forest with...
Curated Video
Hands-On Continuous Integration and Automation with Jenkins - Tour of Jenkins Dashboard
This video gives an overview of the Jenkins dashboard and admin console and introduces key concepts and terminology.
Curated Video
Data Science Model Deployments and Cloud Computing on GCP - Introduction to Airflow
This video provides an introduction to Airflow. This clip is from the chapter "Dataproc Serverless PySpark" of the series "Data Science Model Deployments and Cloud Computing on GCP".In this section, you will learn about Dataproc, a fully...
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Elastic MapReduce (EMR)
Do you need to process massive amounts of data for business analytics? Do you want to upload data to S3 buckets and have it processed automatically? If the answer is yes, you should explore the capabilities of Elastic MapReduce (EMR).
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Load Balancer Concepts
Before you can consider the AWS features that assist in implementing load balancing, you must understand general load balancer concepts. This is particularly true for a design architect. In this video, you will explore the load balancer...
Curated Video
Blender to Unreal Engine - Become a Dungeon Prop Artist - Importing Texture Maps with Node Wrangler
In this lesson, you will find out how to import texture maps with Node Wrangler in Blender. This is perhaps the most useful built-in addon that's available for Blender. This addon makes creating materials a real joy.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Introduction to TCP/IP
The Transmission Control Protocol/Internet Protocol (TCP/IP) is the cornerstone of Internet addressing and routing. It's important to understand IP addressing schemes and to see how TCP and IP work together to make the Internet work....
Curated Video
Behavioral Design Patterns in C++ - Containers - III (Issues)
This video explains the issue where the elements inside the container are accessed. This clip is from the chapter "Iterator" of the series "Behavioral Design Patterns in C++".This section focuses on the Iterator design pattern.
Curated Video
Behavioral Design Patterns in C++ - Containers - II (List)
In this video, you will implement another class called linked list. This clip is from the chapter "Iterator" of the series "Behavioral Design Patterns in C++".This section focuses on the Iterator design pattern.
Curated Video
Deep Learning - Computer Vision for Beginners Using PyTorch - LeNet Overview
In this video, let's first understand what LeNet architecture is. This clip is from the chapter "LeNet Architecture in PyTorch" of the series "Deep Learning - Computer Vision for Beginners Using PyTorch".In this section, you will learn...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Introduction to TCP/IP
The Transmission Control Protocol/Internet Protocol (TCP/IP) is the cornerstone of Internet addressing and routing. It's important to understand IP addressing schemes and to see how TCP and IP work together to make the Internet work....
Curated Video
HashiCorp Certified - Vault Associate Course - Configuring the Integrated Storage Backend
This video demonstrates configuring the integrated storage backend. Integrated Storage is the newest storage backend that alleviates you from having to also manage a Consul cluster for a storage backend. Learn more about what integrated...
Curated Video
HashiCorp Certified - Vault Associate Course - Configuring the Consul Storage Backend
This video helps in configuring the Consul Storage backend. Consul is still one of the most popular storages backends when deploying Vault; here, we will cover it. This clip is from the chapter "Installing Vault" of the series "HashiCorp...
Curated Video
HashiCorp Certified - Vault Associate Course - Storage Backends
This video focuses on storage backends in HashiCorp Vault, which are responsible for persisting Vault data to disk or other storage media. Vault needs a place to store its data, and that "place" is called a storage backend. This clip is...
Curated Video
Getting Started with HashiCorp Nomad - Working with Volumes
After learning more about networking, we will discuss working with volumes; for workloads that require storage for stateful workloads, Nomad provides access to host volumes or CSI volumes. This clip is from the chapter "Expanding on...
Curated Video
Getting Started with HashiCorp Nomad - Understanding the Nomad Components
After a brief introduction about Nomad, we will now discuss the components of Nomad and node. These agents run in server and client modes, jobs, jobs specifications, vault, driver, task, task groups, evaluation, and allocation. This clip...
Curated Video
Getting Started with HashiCorp Nomad - Demo - Job Constraints
This is a demonstration of creating and understanding job constraints. We will define new allocations, constraints, and attributes for the new client we created in the previous lesson. This clip is from the chapter "Expanding on Nomad...