Hi, what do you want to do?
Globalive Media
Beyond Innovation: Episode 13
Cameras map out streets for self-driving cars, a keyboard fits into a glove and a robot installs drywall. Plus, Anthony and Michael speak with the startup turning air pollution into liquid fuel. Hosted by venture capitalist Anthony...
Zach Star
How Much do Engineers and Scientists Make? Salary and Employment Statistics
Two common statistics that are helpful to know about any college major are: how much money you can expect to make, and the amount of job opportunities. Here I outline the statistics for many of the most majors and careers when it comes...
Curated Video
Predictive Analytics with TensorFlow 11.1: Reinforcement Learning
Supervised and unsupervised learning appears at opposite ends of the spectrum, RL exists somewhere in the middle. We use reinforcement learning to discover a good sequence of actions to take the maximum expected rewards. We will also see...
Curated Video
Predictive Analytics with TensorFlow 6.3: Using BOW for Predictive Analytics
In this video, we will see how to perform a bit more complex predictive analytics using the bag-of-words concept of NLP with TensorFlow. At first, we will formalize the problem, and then will explore the dataset that will be used....
Curated Video
UX Design for Web Developers (Video 17)
User experience (UX) design is a theoretical understanding of how users interact with websites. The major challenge developers building a company website face is finding the right balance that fulfills the objectives of the company as...
Curated Video
Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...
Curated Video
Predictive Analytics with TensorFlow 11.2: Developing a Multiarmed Bandit's Predictive Model
One of the simplest RL problems is called n-armed bandits. The thing is there are n-many slot machines but each has different fixed payout probability. The goal is to maximize the profit by always choosing the machine with the best...
Curated Video
Predictive Analytics with TensorFlow 10.3: Improved Factorization Machines for Predictive Analytics
In this video, we will see Neural factorization machines is used to for making predictions under sparse settings by seamlessly combining the linearity of FM and the non-linearity of the neural network. • Understand neural factorization...
Globalive Media
Beyond Innovation: Episode 7
An algorithm makes insurance firms smarter, AI and blockchain join forces and the future of cryptocurrencies becomes clearer. Plus, Anthony and Michael speak with the startup making it virtually impossible to hack into sensitive...
Curated Video
Predictive Analytics with TensorFlow 8.4: CNN-based Predictive Model for Sentiment Analysis
This video will try to see if we can use CNN for such a use case and experience much better accuracy. Well, the motivation here is that we know CNN is mostly suitable for handling image recognition, classification, or pattern...
Curated Video
High Performance Scientific Computing with C 1.3: Interpolation and Extrapolation
How can we "fill in" the data points between discrete data? How can we extend beyond our data points? • Learn linear interpolation • Learn polynomial interpolation • See the dangers of extrapolation
Curated Video
Predictive Analytics with TensorFlow 5.2: Using kNN for Predictive Analytics
kNN is non-parametric and instance-based and is used in supervised learning. In this video, we will see working principles of kNN, we will also implement kNN-based predictive model. • See the working principles of kNN • Implement a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Malware
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy-Segment 2
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Curated Video
Learning D3.JS 5.0 1.2: What Is Data Visualization?
In this video, we will learn what data visualization is, visual perception, and also what makes a good visualization. • Understand the definition of data visualization • Discuss visual perception • Learn the steps to make a great...
Curated Video
Predictive Analytics with TensorFlow 9.1: Using BRNN for Image Classification
We will first provide some contextual information about RNNs. We will see how to implement a BRNN implementation example using the TensorFlow library. The example is using the MNIST database of handwriting. • Look at contextual...
Programming Electronics Academy
NeoPixel timer with Arduino - super easy and fun!
I don't know about you, but I really enjoy playing board games with friends. I like talking, eating good snacks, and just having some friendly competition. But it seems like every time I play a board game with a group of friends, there's...
Curated Video
Java 11 Programming for Beginners 3.3: Inheritance — The Non-Taxable Kind
Showcase the heaviest concept in OOP by example. • Build a second bot by leveraging the first • Go through theory
Curated Video
Predictive Analytics with TensorFlow 5.1: Using K-means for Predictive Analytics
This video will have a brief introduction to the unsupervised machine learning technique. We will also look at k-means for predictive analytics. • Understand the concept of clustering • See how k-means work • Use k-means for predicting...
Curated Video
Predictive Analytics with TensorFlow 7.4: Deep Belief Networks
While weights of an MLP are initialized randomly, a DBN uses a greedy layer-by-layer pretraining algorithm to initialize the network weights through probabilistic generative models composed of a visible layer and multiple layers of...
Curated Video
Predictive Analytics with TensorFlow 7.2: Fine-tuning DNN Hyperparameters
First, we will see DNN performance analysis. Next, we will tune the DNN hyperparameters. • Do DNN performance analysis • Tune the DNN hyperparameters
Science360
Science for a Sustainable Future - Innovators
Princeton University physical chemist Emily Carter is using fundamental scientific principles to create computer simulation tools that will help predict the behavior of different materials including renewable fuels. The research, which...
Curated Video
Learning D3.JS 5.0 2.4: Creating Circles and Ellipses
In this video, we will learn how to create circles and ellipses. • Code a circle and view it in the browser • Fix the problem with viewing only one quarter of the circle • Code an ellipse and view it correctly