Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Software development methodologies part 2
CISM Domain 1: Information Security Governance: Software development methodologies part 2 This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
National Institute of Standards and Technology
Vint Cerf: The past, present and future of the internet
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Curated Video
Tips, Tricks, and Techniques for Node.js Development 5.4: Node Process Manager
In this video, we will see how to use a process manager to keep our Node.js applications up and running. • Get an introduction to node process manager • Show strongloop • Show pm2
Curated Video
Predictive Analytics with TensorFlow 9.2: Implementing an RNN for Spam Prediction
We will see how to implement an RNN in TensorFlow to predict spam/ham from texts. • Construct RNN network • Perform the training • Plot accuracy over time
Programming Electronics Academy
Which Arduino IDE should I use?
Did you know that the Arduino company provides for free three different tools for programming your Arduino board? They're called Integrated Development Environments or IDEs. If you're trying to figure out which one you should use, then...
NASA
Elegance: Music & Math
At NASA's Goddard Space Flight Center in Greenbelt, Maryland, this past summer, sometimes before the start of the work day, interns Philip Lu and Gabriel Apaza played impromptu classical piano concerts on the Steinway in Goddard's...
Curated Video
Python for Network Forensics 3.1: Enumerating Directories
In this video, we will further the understanding of directory traversal in GNU/Linux systems. We will also understand and accomplish traversal recursively. • Learn the concepts of threading to implement recursive traversing • Begin using...
Curated Video
Tips, Tricks, and Techniques for Node.js Development 4.4: Code Coverage
In this video, we will learn how to look at the coverage of our code. • Install istanbul • Show coverage measurements • Analyze our code coverage
Curated Video
Learning D3.JS 5.0 8.4: Setting Up a Line Chart
In this video, we will learn how to set up a basic structure for a line chart. • Understand the HTML file • Understand the CSS file • Understand the app.js file and view the result
Science360
Computer scientist Anthony Joseph - ScienceLives
The Cold War may be over, but silent dangers still lurk in cyber space. With increasing amounts of sensitive personal information — social security numbers, financial data, stock transactions — finding its way onto computing networks,...
Curated Video
Describe the different types of malware that could affect a computer system or network : Keyloggers and Information Stealers
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Programming Electronics Academy
Arduino MASTERCLASS | What can Arduino do? PART 1
Are you looking for the perfect series of videos to get started with Arduino? Well, you are in luck, because in this series of videos, you are going to learn everything you need to get started with Arduino. By the time you're done here,...
Curated Video
Java 11 Programming for Beginners 5.3: Working with Annotations
Here we cover annotations and how they help with documentation as well as compile-time and runtime uses. • Add an analysis of financial data based on average spending on each day of week. The new code uses annotations • Explain the...
Curated Video
Java 11 Programming for Beginners 2.4: Using Primitive Types
This is a heavyweight video. We do most of the example solving here to showcase primitive types. • Quick run through of the various primitive types in Java • A brief mention of overflow and underflow • A live programming session solving...
Curated Video
Mastering Tableau 2018.1, Second Edition 7.2: Quick Table Calculations – Running Total and Difference
In this video, we’ll see the details of running total and difference. • Understand running total and difference • Implement running total and difference
Curated Video
Bug Bounty Program Certification 10.3: About the Android App Bug Bounty Program
This video focuses on the information about Android bug bounty program. • Get basic understanding of Android bug bounty program overview • Explore listing tools and resources used • Learn about the process of Android app bug bounty
Curated Video
Cloud Native Development on Azure with Java 1.1: The Course Overview
This video will give you a gist of what the course offers you.
Curated Video
Describe computer programming : Decomposition
From the section: Common Coding Concepts.This section will cover common coding concepts such as Scratch setup, bugs, pseudocode, decomposition, commenting and many more. Common Coding Concepts: Decomposition
All In One Social Media
How To Streamyard: How To Add Video To Live Stream for Streamyard
Adding video to a live stream couldn't be easier with Streamyard, which is why in this video I am going to show you how to add video to live stream. Whether you are adding video so you can do a show introduction or you want to play clip...
Curated Video
C++ Programming By Example - Planning out an Application
How to structure and plan an application? • Identify key parts of the application • Plan out the class structure using class diagrams (UML) • Create a class implementation using UML diagrams This clip is from the chapter "Building a...
Mazz Media
Data Presents Risk
Data is both valuable and risky. This video explores the risk and impact of Inaccurate, incomplete, or outdated data because it's wrong. Viewers will learn that misuse, unreliability, and inappropriate use are other data risks. After...
TLDR News
How Apple & Google COVID Tracing Apps Work: Government Surveillance or High Tech Genius? - TLDR News
A couple of months ago Apple & Google announced their API to help governments track COVID. Since then Google & Apple have begun rolling out their systems, updating their OS and preparing while governments have begun implementing the...
Curated Video
Java 11 Programming for Beginners 4.1: Understanding Assignment and Operators
Go through assignment and other operators. • We explain the example of a Pig Latin Translator • Explain operators • Implement a Pig Latin translator example
Curated Video
High Performance Scientific Computing with C 4.4: GPGPU with CUDA
How can we accelerate our codes using modern GPUs? What is CUDA? • Learn how to add CUDA kernels to our code • See how to use nvcc to compile CUDA code • Learn about tuning CUDA code for performance