Curated Video
The Complete React Developer Course (with Hooks and Redux) - Fetching Expenses: Part II
In this video you'll learn how to use async Redux actions to fetch data from Firebase. This clip is from the chapter "Firebase with Redux" of the series "The Complete React Developer Course (with Hooks and Redux)".This section explains...
Curated Video
HTML CSS and JavaScript for Beginners - A Web Design Course - Try to Build a Page
In this video, we'll build a page. This clip is from the chapter "Learn HTML Course Section" of the series "HTML CSS and JavaScript for Beginners - A Web Design Course".Learn about HTML here. You will learn about Element, HTML page...
Curated Video
Modern HTML and CSS from the Beginning (Including Sass) - Meta Tags & Search Engines
HTML Basics: Meta Tags & Search Engines This clip is from the chapter "HTML Basics" of the series "Modern HTML and CSS from the Beginning (Including Sass)".This Section contains the HTML Basics.
Curated Video
Modern HTML and CSS from the Beginning (Including Sass) - Custom Domain Name
Website Deployment With Netlify (FREE): Custom Domain Name This clip is from the chapter "Website Deployment With Netlify (FREE)" of the series "Modern HTML and CSS from the Beginning (Including Sass)".In this Section, we’ll deployment a...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - XSS mitigation and prevention
Cross Site Scripting: XSS mitigation and prevention This clip is from the chapter "Cross Site Scripting" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will look into most common and...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Wrapping up the OWASP top 10 list
One last word: Wrapping up the OWASP top 10 list This clip is from the chapter "One last word" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, before wrapping up the author gives a quick...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - What is XSRF?
Cross Site Request Forgery: What is XSRF? This clip is from the chapter "Cross Site Request Forgery" of the series "Web Security: Common Vulnerabilities And Their Mitigation".We will focus on attention another common attack called XSRF...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Learn by example - sessions without cookies
Session Management: Learn by example - sessions without cookies This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security threats...
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Symmetric Key Encryption
In this video, we'll learn about symmetric key encryption. This clip is from the chapter "Encryption and Hashing Overview" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you learn about encryption and hashing.
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Signing Data Using Asymmetric Keys
In this video, we'll learn about signing data using asymmetric keys. This clip is from the chapter "Encryption and Hashing Overview" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you learn about encryption...
Curated Video
Fetch()ing Data in JavaScript
Often JavaScript apps interact with other sites and services to obtain data, like maps or transit data. In this video, Mark will show you how to use fetch() to retrieve data from other apps.
Curated Video
HTML5 Hyperlinks
HTML5 Hyperlinks are used to move users from one page to another within a site or between sites on the web. In this video, Mark will teach you to make external HTML5 links, internal HTML5 links, and named anchors, which are hyperlinks...
Curated Video
DevOps Complete Course - Maven Goals
This video explains about Maven goals. This clip is from the chapter "Maven" of the series "DevOps Complete Course".This section focuses on Maven from scratch.
Food Farmer Earth
Counting Copper River Sockeye Salmon at Childs Glacier
As Elliot Johnson of Alaska Department of Fish and Game explains in the video, the Childs Glacier monitoring station is responsible for counting the returning salmon as they complete their ocean migration back to their native spawning...
The Guardian
YouTube kids: how unboxing, gaming and toy reviews took over
Being a YouTuber is now the most popular aspiration for children today, according to a survey. In 2018, the site’s highest earner was a seven-year-old American toy reviewer. But the video platform has been mired in controversy over its...
Curated Video
Italy, Pompeii Odeon
The Odeon was a smaller roofed theatre, theatrum tectum, that sat 1500 spectators built in 80 BC. The theatre follows the plan of other Roman theatres and odeon structures. Where the Large Theatre was used primarily for staging drama,...
Curated Video
Italy, Rome, Roman Forum - Basilica Julia
The Basilica Julia was a structure that once stood in the Roman Forum. It was a large, ornate, public building used for meetings and other official business during the early Roman Empire. Its ruins have been excavated. What is left from...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - What is XSS?
Cross Site Scripting: What is XSS? This clip is from the chapter "Cross Site Scripting" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we will look into most common and prevalent attacks called...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Session hijacking using session fixation
Session Management: Session hijacking using session fixation This clip is from the chapter "Session Management" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into security threats like...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Default directives and wildcards
The Content Security Policy Header: Default directives and wildcards This clip is from the chapter "The Content Security Policy Header" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look...
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Overview of the TLS Settings at the Free Hosting
In this video, we'll take a quick overview of the TLS settings at the free hosting. This clip is from the chapter "Custom Domain with Free Hosting" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will help you create...
Curated Video
CompTIA A+ Certification 220-1001: The Total Course - Cloud Computing
In this episode, Mike looks at the benefits of cloud computing (or moving virtual machines out onto the Internet). The cloud VMs enable benefits such as rapid elasticity and on-demand scaling, so you can quickly support any Internet...
Curated Video
Introduction To Website Development Technologies - Create Public Website with Netlify
In this video, you will learn how to create a public website with Netlify. This clip is from the chapter "Publish Website with Netlify" of the series "Introduction to Website Development Technologies".In this section, you will learn to...
TLDR News
Why Did Elon Even Want to Buy Twitter - TLDR News
Yesterday it was announced that Twitter had accepted Elon Musk's offer to buy them for $44 billion. So in this video we outline how the Elon managed to persuaded Twitter and what the hell he even wants to do with it?