The Wall Street Journal
The Weakest (Supply Chain) Link
A company's security is only as good as that of its partners that have access to its critical systems. Take a look at how to manage the risks. Plus, examine how to strike the right balance between security and access.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
All Ears English
All Ears English Podcast 1586: How to Flex Your English Muscles
All Ears English Podcast 1586: How to Flex Your English Muscles
Espresso Media
Mapping and Quantifying Gum Pollution: Revealing the Extent of the Problem
In this video, a high tech company in Toronto uses their mapping technology and software to quantify the amount of gum pollution on city sidewalks. They have also developed an app that allows users to track and pinpoint areas with high...
Science360
Meet HARMONY-a first-of-its-kind rehab robot-NSF Science Now 34
In this week’s episode we learn about an app to detect sleep apnea, teen risk-taking, a new Wi-Fi booster and, finally, we explore a first-of-its-kind rehab robot. Check it out!
Curated Video
Python for Network Forensics 4.2: Capturing Linux Memory
In this video, we will capture images of volatile memory on Linux systems. We will also learn to use the Python-based LiMEaide to ease memory capture, especially in remote environments. • Begin to understand how LiMEaide acquires memory...
Curated Video
Predictive Analytics with TensorFlow 8.6: CNN Predictive Model for Image Classification
This video will develop a CNN predictive model for image classification. • Create the CNN model • Evaluate the model • Make the predictive
The Wall Street Journal
Optimizing Equal Pay with Syndio's Maria Colacurcio
Syndio's 'EquityTech' software analyzes salaries, rooting out discriminatory differences while providing strategies to fix those disparities. CEO Maria Colacurcio dissects how this software works to help organizations hold themselves...
Programming Electronics Academy
Connect Arduino to internet over USB (with Processing) - Simple Space Weather meter example (Part 1)
Have you ever wanted to connect your Arduino to the internet? Your first thought was probably like okay, I guess I'll need some type of Wi-Fi shield or a Wi-Fi enabled board in order to connect to the internet. But what if you're...
Science360
A first-of-its-kind rehab robot! NSF Science Now 34
In this week’s episode, we learn about an app to detect sleep apnea, teen risk-taking, a new Wi-Fi booster and, finally, we explore a first-of-its-kind rehab robot.
Octopus TV
Eating Disorders - 'SMART Planning' Technique For Carers
In this interview Jenny Langley discusses techniques to help carers and patients approach challenges in a way that can increase success through the SMART planning technique; specific, measurable, achievable, realistic within a time frame.
Curated Video
Bug Bounty Program Certification 13.1: About the Bug Bounty Exam and Certification
In this video, you will get information about bug bounty exams and preparation. • Look at the listing of bug bounty exams • Get the information about certifications • Preparation steps for exam
The Business Professor
Decision-Making and Relevant Costing
Relevant costs or relevant costing is closely related to decision making. A relevant cost is a cost that will directly change based upon a singular decision.
Curated Video
Statistics for Data Science and Business Analysis - Studying Regression Tables
In this video, you'll learn about regression tables. This clip is from the chapter "Subtleties of Regression Analysis" of the series "Statistics for Data Science and Business Analysis".This section explains the Markowitz Portfolio...
Curated Video
DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Required Tools and Software Downloads
In this video the author explains about the required tools to install software. This clip is from the chapter "Prerequisites" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA".In this section, you will be able...
Step Back History
Badass Women in History
Humanity has done some amazing things, and created some beautiful works. This week I want to continue the series of badass women in history by honouring three amazing ladies. These women were great contributors to technology, science,...
Science360
Researchers develop powered prosthetic 'tuning' software. See it in NSF Science Now episode 37!
In this week’s episode of NSF Science Now(37) we examine tunable prosthetics, explore origami engineering, duck-billed dinosaurs and discover how a population of King Crabs has migrated to the warming seas off the Antarctic...
Science360
Bogdan Mihaila describes the extreme software challenges of an upgraded Large Hadron Collider
Bogdan Mihaila describes how the Large Hadron Collider is helping reveal new insights into the universe, and the need for software to handle the extreme challenges presented by its upgrade in 2026. Mihaila is the program officer...
The Wall Street Journal
A Cyber Rethink
Are companies doing the right things, measuring the right things and structured in the right way to manage current and coming threats? We examine how to structure security staff and policy to be ready for next new threats.
Curated Video
Python for Network Forensics 3.5: Reading the Journal
In this video, we will continue our experimentation with reading and parsing system logs. • Further interact with the Systemd journal • Use our Python skills to effectively parse information regarding system events • Narrow down events...
Curated Video
High Performance Scientific Computing with C 1.1: The Course Overview
This video will give you an overview about the course.
Curated Video
Cloud Native Development on Azure with Java 2.1: Build a Spring Boot Java Application and Provide CRUD Functionality for a To-Do List
This video will walk you through a few quick steps to create a simple To-Do application capable of tracking your upcoming tasks. You can add new tasks to the application, and when you are done with a particular task, you can mark it as...
Blockchain Central
Blockchain Forks for Beginners | Blockchain Central
This week on Blockchain Central: we'll talk about the different types of blockchain forks and the differences between them, as well as discuss their preconditions and implications.
__
'Blockchain Central' is your #1 trusted source for...
Curated Video
High Performance Scientific Computing with C 1.5: Linear Equations and Matrix Methods
How can we invert a matrix? How fast can we do it? • Learn why matrix inversion is useful • See how to invert a matrix numerically • Learn how expensive matrix inversion is