Instructional Video2:21
Rachel's English

English Pronunciation - Reduction: the word FOR - American English

6th - Higher Ed
How to pronounce the word 'FOR' -- American English pronunciation / accent training.
Instructional Video9:06
Curated Video

Mastering Tableau 2018.1, Second Edition 1.2: Exploring Tableau and Data Visualization

Higher Ed
In this video, we’ll see the features and functionalities that Tableau provides. We’ll also look at the basics of creating a data visualization. • How to visualize data in Tableau? • Creating your first data visualization
Instructional Video25:51
The Wall Street Journal

Training The Next Generation Of Technologists

Higher Ed
How can CIOs boost productivity - their company's and their own? We look at the expanding requirements of the job, the need to understand both tech and business management leadership.
Podcast53:19
NASA

‎Houston We Have a Podcast: Uncommon Origins

Pre-K - Higher Ed
Shawn Cvetezar, Laura Paulino, and Don Caluya, NASA interns representing NASA’s Marshall Space Flight Center, Ames Research Center, and Johnson Space Center, respectively, reflect upon their non-traditional paths that led them to NASA...
Instructional Video23:57
Globalive Media

Beyond Innovation: Episode 11

Higher Ed
A patient moves a prosthetic limb with his thoughts, a personal submarine dives to the ocean’s depths and a venture capitalist finds genius outside Silicon Valley. Plus, Michael and Anthony speak with a company launching a flying taxi...
Instructional Video23:22
IDG TECHtalk

What is quantum computing? Its evolution, uses cases and how to access it

Higher Ed
You may have heard of quantum computing, but what is it, and what problems can it solve? Plus, what makes quantum computing different from classical computing, and how can enterprises access and harness the technology? Serdar Yegulalp,...
Instructional Video6:11
Curated Video

Disaster Recovery Planning: Ensuring Business Continuity

Higher Ed
Business continuity ensures that business processes can continue despite interruptions. Continuity of Operations (COOP), Disaster Recovery Plans (DRPs), as well as hot, warm, and cold alternate sites are discussed. This clip is from...
Instructional Video25:38
The Wall Street Journal

Anticipating the Next Big Security Threat

Higher Ed
Cybersecurity experts Cheryl Davis and David Koh speak with WSJ Senior Editor Yun-Hee Kim about emerging security threats and how to protect businesses from cyberattacks.
Instructional Video10:57
Curated Video

Describe the different types of malware that could affect a computer system or network : Backdoors

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video5:00
Curated Video

Animation and Persistence of Vision

Pre-K - Higher Ed
Animation is a common effect used in cartoons and videos that allows us to perceive movement in still images. Let's look at some common animation techniques to see how they trick our minds. Illusions part 6/11
Instructional Video17:06
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 7

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video5:59
Curated Video

Bug Bounty Program Certification 3.1: Overview of Preparation Steps

Higher Ed
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Instructional Video8:39
Programming Electronics Academy

Arduino Toolchain: Arduino Course 2.7

Higher Ed
A high level description of the software tools used to get the code you write on an Arduino board.
Instructional Video2:34
Science360

Visualization Wall

12th - Higher Ed
A giant video screen that takes up an entire wall, floor to ceiling, is allowing scientists to see details they've never seen before. Developed at Tufts University with help from the National Science Foundation, the Visualization Wall...
Instructional Video7:59
Curated Video

Ensemble Machine Learning Techniques 3.3: Making Predictions on Movie Ratings Using SVM

Higher Ed
In this video, we will use Python to implement the Bagging technique using SVM. • We will use Jupyter Notebook to execute our code • Use Movie Rating to perform classification • Implement Bagging in python for classification
Instructional Video5:36
Curated Video

Learning D3.JS 5.0 6.1: Get Started with Bars

Higher Ed
In this video, we will learn how to create a basic bar graph. • Understand the code and add more code to the given files • Understand how it’s done manually and how it’s done on D3.js • View the result with the developers’ tools
Instructional Video3:24
Curated Video

Describe cyber attacks that could affect a computer system or network : Overview of Network Security

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video12:07
All In One Social Media

The COMPLETE Real Estate Agent's Live Streaming Guide (2021)

Higher Ed
In a world where human interaction is discouraged and digital mediums thrive, this video will give the complete live streaming guide for Real Estate Agents!
Instructional Video5:55
Curated Video

Describe the different types of malware that could affect a computer system or network : Downloaders

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video2:20
APMonitor

Introduction to OT Cybersecurity

10th - Higher Ed
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
Instructional Video6:27
Curated Video

Bug Bounty Program Certification 11.1: About Android App Frontend Penetration

Higher Ed
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Instructional Video2:32
Curated Video

Bug Bounty Program Certification 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Instructional Video8:30
Packt

Compare the breadth-first and depth-first search algorithms : Installation and Setup

Higher Ed
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title. • Download python, Graphviz, and Pip. • Run the installer and install these...
Instructional Video21:26
The Wall Street Journal

CEOs Of Automation Anywhere And UiPath On Robotic Process Automation

Higher Ed
Daniel Dines and Mihir Shukla discuss how to get the most out of business process automation investments.