Instructional Video2:56
Curated Video

Learning D3.JS 5.0 1.3: What Is D3.js?

Higher Ed
In this video, we will learn what D3.js is, why it’s useful, how to use diagrams and shapes, and examples of bad and good graphs. • Understand the definition of D3.js • Learn the benefits of using D3.js • Understand examples of bad and...
Instructional Video4:41
Curated Video

Agile Masterclass: Agile for Project Management - Introduction to Kanban Board

Higher Ed
This video explains Kanban board. This clip is from the chapter "Introduction to Agile Kanban" of the series "Agile Project Management: Agile, Scrum, Kanban, and Extreme Programming".This section introduces you to Agile Kanban.
Instructional Video8:54
Curated Video

Python for Network Forensics 5.1: Enumeration

Higher Ed
In this video, we will begin to think as an attacker and learn how to enumerate devices on a network. • Learn the basics of calling system commands in Python • Learn how to enumerate network devices • Using Python, build an application...
Instructional Video8:16
Curated Video

Python for Network Forensics 1.4: Importing Scapy Modules

Higher Ed
In this video, we will design a Python based Scapy tool to automate our network analysis. • Familiarize ourselves with common Python data structures • Learn to import 3rd party modules into our own application • Unleash the power of...
Instructional Video5:52
Curated Video

Mastering Tableau 2018.1, Second Edition 5.6: Working with Colors and Shapes

Higher Ed
In this video, we’ll see how to apply colors and shapes using marks card. • Understand marks card: colors and shape • Apply colors using marks card • Applying shapes using marks card
Instructional Video11:06
ATHS Engineering

Real Engineers Share Their Stories: From Mechanical to Software Engineering

9th - Higher Ed
The video is an interview with a Tech alumni who shares his journey from mechanical engineering to software engineering, and gives advice on how to become an engineer, emphasizing the importance of communication and showing initiative...
Instructional Video22:07
Curated Video

Data Science and Machine Learning with R - Data Import/Export

Higher Ed
This video explains how to import and export data in R. This clip is from the chapter "Intermediate R" of the series "Data Science and Machine Learning with R from A-Z Course [Updated for 2021]".This section explains intermediate R.
Instructional Video4:45
Programming Electronics Academy

Tutorial 02: Download and install the Arduino IDE: Arduino Course for Absolute Beginners (ReM)

Higher Ed
One of the absolute best things about the Arduino platform is how easy it is to get started. The software that installs on your computer is completely free and designed specifically for ease of use. The program is called an Integrated...
Instructional Video9:57
ShortCutsTv

Introducing Geographical Offender Profiling

Higher Ed
Geographical offender profiling is now being used by police forces around the world to help focus investigations into a connected series of crimes where there are no obvious suspects. This film introduces students to the principles and...
Instructional Video1:45
Apalapse

How to Create Star Trails in 2 Minutes

9th - 12th
I've already covered how to avoid star trails in astrophotography, but sometimes, it's just the effect you need to create a stunning photo. Star trail photography can seem challenging, both in-camera and in-post production, but hopefully...
Instructional Video6:51
Curated Video

Python for Network Forensics 3.2: Exploring File Properties

Higher Ed
Using the power of recursive traversal, we will begin to search and populate file properties. • Enrich your understanding of directory traversal • Modify our application to populate file properties • Search returned results to understand...
Instructional Video3:49
Curated Video

Java 11 Programming for Beginners 3.4: Working with Many Forms of Polymorphism

Higher Ed
Polymorphism is hard without examples, so we go through a few. • Build another bot and use it as an example for method overriding • Go through theory • Show an example for method overloading
Instructional Video6:19
Curated Video

Bug Bounty Program Certification 10.4: Components of the Android App Bug Bounty Program

Higher Ed
In this video, you will get Information about Android app components. • Learn about various components of Android app bug bounty program • Explore various vulnerabilities in android machines • Learn about reward on the basis of level of...
Instructional Video6:30
Curated Video

Cloud Native Development on Azure with Java 3.3: Configure the App to Use Your Azure AD Tenant

Higher Ed
Now that we have registered our app with the Azure Active Directory, the next step is to configure the app to use our Azure AD tenant and then package and redeploy our app. Let’s do it right now! • Change the App ID URI and the reply...
Instructional Video20:50
The Wall Street Journal

Are We Winning?

Higher Ed
High-profile breaches continue, from DNC and Equifax to Facebook and Under Armour. Malware and ransomware grind businesses to a halt, and vulnerabilities face utilities and other infrastructure. What's the score in the battle over...
Instructional Video13:15
Brainwaves Video Anthology

Pia Avolio de Martino - Kidlink

Higher Ed
Pia Avolio de Martino, Milan, Italy is the Vice Chairman of Kidlink.
Instructional Video3:36
Science360

Science Now Episode 7

12th - Higher Ed
This episode explores an innovative new monitoring software that allows diabetics with chronic foot ailments to track and monitor their condition at home, and a vast collection of subglacial lakes hidden deep beneath the West Antarctic...
Instructional Video8:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers

Higher Ed
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
Instructional Video13:52
IDG TECHtalk

Is end-to-end encryption for videoconferencing important?

Higher Ed
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
Instructional Video8:23
IDG TECHtalk

Your Windows 10 1903 questions answered | TECH(talk)

Higher Ed
You asked (questions about Windows 10) and we answered (with advice from Windows expert Preston Gralla). We cover everything from the pace of annual updates, how to find better Windows apps and why you should change your default browser.
Instructional Video12:56
Curated Video

DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Spring Boot Basic Server Code

Higher Ed
You will be able to code some basic server side code for the controller and be able to add the test cases. This clip is from the chapter "Development (Code, Test, Review and Merge)" of the series "DevOps with GIT(Flow) Jenkins,...
Instructional Video12:05
Curated Video

High Performance Scientific Computing with C 1.4: Numerical Integration

Higher Ed
How can we calculate integrals with a computer? How can we solve differential equations? • Calculate integrals with the trapezoid and Simpson’s rule • See how the error terms scale with different algorithms • Solve differential equations...
Instructional Video8:59
Curated Video

High Performance Scientific Computing with C 3.2: Pipelining and Hardware-Oriented Design

Higher Ed
How can we design our programs to take the most advantage of modern CPU design? • Learn about caching • Learn about branch prediction and speculative execution • Stay out of the way of the CPU and compiler!
Instructional Video5:48
Curated Video

Cloud Native Development on Azure with Java 2.5: Build and Deploy a New Azure App Service Instance

Higher Ed
In this video, we will create an Azure web application hosted within the Azure App Service. We will configure it such that it will be compatible for hosting our Java Spring Boot application. • Add a new web application • Deploy a default...