Rachel's English
English Pronunciation - Reduction: the word FOR - American English
How to pronounce the word 'FOR' -- American English pronunciation / accent training.
Curated Video
Mastering Tableau 2018.1, Second Edition 1.2: Exploring Tableau and Data Visualization
In this video, we’ll see the features and functionalities that Tableau provides. We’ll also look at the basics of creating a data visualization. • How to visualize data in Tableau? • Creating your first data visualization
The Wall Street Journal
Training The Next Generation Of Technologists
How can CIOs boost productivity - their company's and their own? We look at the expanding requirements of the job, the need to understand both tech and business management leadership.
NASA
Houston We Have a Podcast: Uncommon Origins
Shawn Cvetezar, Laura Paulino, and Don Caluya, NASA interns representing NASA’s Marshall Space Flight Center, Ames Research Center, and Johnson Space Center, respectively, reflect upon their non-traditional paths that led them to NASA...
Globalive Media
Beyond Innovation: Episode 11
A patient moves a prosthetic limb with his thoughts, a personal submarine dives to the ocean’s depths and a venture capitalist finds genius outside Silicon Valley. Plus, Michael and Anthony speak with a company launching a flying taxi...
IDG TECHtalk
What is quantum computing? Its evolution, uses cases and how to access it
You may have heard of quantum computing, but what is it, and what problems can it solve? Plus, what makes quantum computing different from classical computing, and how can enterprises access and harness the technology? Serdar Yegulalp,...
Curated Video
Disaster Recovery Planning: Ensuring Business Continuity
Business continuity ensures that business processes can continue despite interruptions. Continuity of Operations (COOP), Disaster Recovery Plans (DRPs), as well as hot, warm, and cold alternate sites are discussed.
This clip is from...
The Wall Street Journal
Anticipating the Next Big Security Threat
Cybersecurity experts Cheryl Davis and David Koh speak with WSJ Senior Editor Yun-Hee Kim about emerging security threats and how to protect businesses from cyberattacks.
Curated Video
Describe the different types of malware that could affect a computer system or network : Backdoors
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
Animation and Persistence of Vision
Animation is a common effect used in cartoons and videos that allows us to perceive movement in still images. Let's look at some common animation techniques to see how they trick our minds. Illusions part 6/11
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 7
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Programming Electronics Academy
Arduino Toolchain: Arduino Course 2.7
A high level description of the software tools used to get the code you write on an Arduino board.
Science360
Visualization Wall
A giant video screen that takes up an entire wall, floor to ceiling, is allowing scientists to see details they've never seen before. Developed at Tufts University with help from the National Science Foundation, the Visualization Wall...
Curated Video
Ensemble Machine Learning Techniques 3.3: Making Predictions on Movie Ratings Using SVM
In this video, we will use Python to implement the Bagging technique using SVM. • We will use Jupyter Notebook to execute our code • Use Movie Rating to perform classification • Implement Bagging in python for classification
Curated Video
Learning D3.JS 5.0 6.1: Get Started with Bars
In this video, we will learn how to create a basic bar graph. • Understand the code and add more code to the given files • Understand how it’s done manually and how it’s done on D3.js • View the result with the developers’ tools
Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
All In One Social Media
The COMPLETE Real Estate Agent's Live Streaming Guide (2021)
In a world where human interaction is discouraged and digital mediums thrive, this video will give the complete live streaming guide for Real Estate Agents!
Curated Video
Describe the different types of malware that could affect a computer system or network : Downloaders
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
APMonitor
Introduction to OT Cybersecurity
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
Curated Video
Bug Bounty Program Certification 11.1: About Android App Frontend Penetration
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Curated Video
Bug Bounty Program Certification 1.1: The Course Overview
This video provides an overview of the entire course.
Packt
Compare the breadth-first and depth-first search algorithms : Installation and Setup
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title. • Download python, Graphviz, and Pip. • Run the installer and install these...
The Wall Street Journal
CEOs Of Automation Anywhere And UiPath On Robotic Process Automation
Daniel Dines and Mihir Shukla discuss how to get the most out of business process automation investments.