Instructional Video21:36
The Wall Street Journal

The Weakest (Supply Chain) Link

Higher Ed
A company's security is only as good as that of its partners that have access to its critical systems. Take a look at how to manage the risks. Plus, examine how to strike the right balance between security and access.
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging

Higher Ed
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Instructional Video16:15
All Ears English

All Ears English Podcast 1586: How to Flex Your English Muscles

Pre-K - Higher Ed
All Ears English Podcast 1586: How to Flex Your English Muscles
Instructional Video5:18
Espresso Media

Mapping and Quantifying Gum Pollution: Revealing the Extent of the Problem

9th - 12th
In this video, a high tech company in Toronto uses their mapping technology and software to quantify the amount of gum pollution on city sidewalks. They have also developed an app that allows users to track and pinpoint areas with high...
Instructional Video5:37
Science360

Meet HARMONY-a first-of-its-kind rehab robot-NSF Science Now 34

12th - Higher Ed
In this week’s episode we learn about an app to detect sleep apnea, teen risk-taking, a new Wi-Fi booster and, finally, we explore a first-of-its-kind rehab robot. Check it out!
Instructional Video11:20
Curated Video

Python for Network Forensics 4.2: Capturing Linux Memory

Higher Ed
In this video, we will capture images of volatile memory on Linux systems. We will also learn to use the Python-based LiMEaide to ease memory capture, especially in remote environments. • Begin to understand how LiMEaide acquires memory...
Instructional Video13:42
Curated Video

Predictive Analytics with TensorFlow 8.6: CNN Predictive Model for Image Classification

Higher Ed
This video will develop a CNN predictive model for image classification. • Create the CNN model • Evaluate the model • Make the predictive
Instructional Video19:49
The Wall Street Journal

Optimizing Equal Pay with Syndio's Maria Colacurcio

Higher Ed
Syndio's 'EquityTech' software analyzes salaries, rooting out discriminatory differences while providing strategies to fix those disparities. CEO Maria Colacurcio dissects how this software works to help organizations hold themselves...
Instructional Video8:03
Programming Electronics Academy

Connect Arduino to internet over USB (with Processing) - Simple Space Weather meter example (Part 1)

Higher Ed
Have you ever wanted to connect your Arduino to the internet? Your first thought was probably like okay, I guess I'll need some type of Wi-Fi shield or a Wi-Fi enabled board in order to connect to the internet. But what if you're...
Instructional Video5:37
Science360

A first-of-its-kind rehab robot! NSF Science Now 34

12th - Higher Ed
In this week’s episode, we learn about an app to detect sleep apnea, teen risk-taking, a new Wi-Fi booster and, finally, we explore a first-of-its-kind rehab robot.
Instructional Video6:02
Octopus TV

Eating Disorders - 'SMART Planning' Technique For Carers

Higher Ed
In this interview Jenny Langley discusses techniques to help carers and patients approach challenges in a way that can increase success through the SMART planning technique; specific, measurable, achievable, realistic within a time frame.
Instructional Video2:03
Curated Video

Bug Bounty Program Certification 13.1: About the Bug Bounty Exam and Certification

Higher Ed
In this video, you will get information about bug bounty exams and preparation. • Look at the listing of bug bounty exams • Get the information about certifications • Preparation steps for exam
Instructional Video2:50
The Business Professor

Decision-Making and Relevant Costing

Higher Ed
Relevant costs or relevant costing is closely related to decision making. A relevant cost is a cost that will directly change based upon a singular decision.
Instructional Video4:35
Curated Video

Statistics for Data Science and Business Analysis - Studying Regression Tables

Higher Ed
In this video, you'll learn about regression tables. This clip is from the chapter "Subtleties of Regression Analysis" of the series "Statistics for Data Science and Business Analysis".This section explains the Markowitz Portfolio...
Instructional Video4:25
Curated Video

DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Required Tools and Software Downloads

Higher Ed
In this video the author explains about the required tools to install software. This clip is from the chapter "Prerequisites" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA".In this section, you will be able...
Instructional Video6:08
Step Back History

Badass Women in History

12th - Higher Ed
Humanity has done some amazing things, and created some beautiful works. This week I want to continue the series of badass women in history by honouring three amazing ladies. These women were great contributors to technology, science,...
Instructional Video6:27
Science360

Researchers develop powered prosthetic 'tuning' software. See it in NSF Science Now episode 37!

12th - Higher Ed
In this week’s episode of NSF Science Now(37) we examine tunable prosthetics, explore origami engineering, duck-billed dinosaurs and discover how a population of King Crabs has migrated to the warming seas off the Antarctic...
Instructional Video1:45
Science360

Bogdan Mihaila describes the extreme software challenges of an upgraded Large Hadron Collider

12th - Higher Ed
Bogdan Mihaila describes how the Large Hadron Collider is helping reveal new insights into the universe, and the need for software to handle the extreme challenges presented by its upgrade in 2026. Mihaila is the program officer...
Instructional Video19:55
The Wall Street Journal

A Cyber Rethink

Higher Ed
Are companies doing the right things, measuring the right things and structured in the right way to manage current and coming threats? We examine how to structure security staff and policy to be ready for next new threats.
Instructional Video6:08
Curated Video

Python for Network Forensics 3.5: Reading the Journal

Higher Ed
In this video, we will continue our experimentation with reading and parsing system logs. • Further interact with the Systemd journal • Use our Python skills to effectively parse information regarding system events • Narrow down events...
Instructional Video4:21
Curated Video

High Performance Scientific Computing with C 1.1: The Course Overview

Higher Ed
This video will give you an overview about the course.
Instructional Video7:05
Curated Video

Cloud Native Development on Azure with Java 2.1: Build a Spring Boot Java Application and Provide CRUD Functionality for a To-Do List

Higher Ed
This video will walk you through a few quick steps to create a simple To-Do application capable of tracking your upcoming tasks. You can add new tasks to the application, and when you are done with a particular task, you can mark it as...
Instructional Video5:19
Blockchain Central

Blockchain Forks for Beginners | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll talk about the different types of blockchain forks and the differences between them, as well as discuss their preconditions and implications. __ 'Blockchain Central' is your #1 trusted source for...
Instructional Video5:26
Curated Video

High Performance Scientific Computing with C 1.5: Linear Equations and Matrix Methods

Higher Ed
How can we invert a matrix? How fast can we do it? • Learn why matrix inversion is useful • See how to invert a matrix numerically • Learn how expensive matrix inversion is