Curated Video
Learning D3.JS 5.0 1.3: What Is D3.js?
In this video, we will learn what D3.js is, why it’s useful, how to use diagrams and shapes, and examples of bad and good graphs. • Understand the definition of D3.js • Learn the benefits of using D3.js • Understand examples of bad and...
Curated Video
Agile Masterclass: Agile for Project Management - Introduction to Kanban Board
This video explains Kanban board. This clip is from the chapter "Introduction to Agile Kanban" of the series "Agile Project Management: Agile, Scrum, Kanban, and Extreme Programming".This section introduces you to Agile Kanban.
Curated Video
Python for Network Forensics 5.1: Enumeration
In this video, we will begin to think as an attacker and learn how to enumerate devices on a network. • Learn the basics of calling system commands in Python • Learn how to enumerate network devices • Using Python, build an application...
Curated Video
Python for Network Forensics 1.4: Importing Scapy Modules
In this video, we will design a Python based Scapy tool to automate our network analysis. • Familiarize ourselves with common Python data structures • Learn to import 3rd party modules into our own application • Unleash the power of...
Curated Video
Mastering Tableau 2018.1, Second Edition 5.6: Working with Colors and Shapes
In this video, we’ll see how to apply colors and shapes using marks card. • Understand marks card: colors and shape • Apply colors using marks card • Applying shapes using marks card
ATHS Engineering
Real Engineers Share Their Stories: From Mechanical to Software Engineering
The video is an interview with a Tech alumni who shares his journey from mechanical engineering to software engineering, and gives advice on how to become an engineer, emphasizing the importance of communication and showing initiative...
Curated Video
Data Science and Machine Learning with R - Data Import/Export
This video explains how to import and export data in R. This clip is from the chapter "Intermediate R" of the series "Data Science and Machine Learning with R from A-Z Course [Updated for 2021]".This section explains intermediate R.
Programming Electronics Academy
Tutorial 02: Download and install the Arduino IDE: Arduino Course for Absolute Beginners (ReM)
One of the absolute best things about the Arduino platform is how easy it is to get started. The software that installs on your computer is completely free and designed specifically for ease of use. The program is called an Integrated...
ShortCutsTv
Introducing Geographical Offender Profiling
Geographical offender profiling is now being used by police forces around the world to help focus investigations into a connected series of crimes where there are no obvious suspects. This film introduces students to the principles and...
Apalapse
How to Create Star Trails in 2 Minutes
I've already covered how to avoid star trails in astrophotography, but sometimes, it's just the effect you need to create a stunning photo. Star trail photography can seem challenging, both in-camera and in-post production, but hopefully...
Curated Video
Python for Network Forensics 3.2: Exploring File Properties
Using the power of recursive traversal, we will begin to search and populate file properties. • Enrich your understanding of directory traversal • Modify our application to populate file properties • Search returned results to understand...
Curated Video
Java 11 Programming for Beginners 3.4: Working with Many Forms of Polymorphism
Polymorphism is hard without examples, so we go through a few. • Build another bot and use it as an example for method overriding • Go through theory • Show an example for method overloading
Curated Video
Bug Bounty Program Certification 10.4: Components of the Android App Bug Bounty Program
In this video, you will get Information about Android app components. • Learn about various components of Android app bug bounty program • Explore various vulnerabilities in android machines • Learn about reward on the basis of level of...
Curated Video
Cloud Native Development on Azure with Java 3.3: Configure the App to Use Your Azure AD Tenant
Now that we have registered our app with the Azure Active Directory, the next step is to configure the app to use our Azure AD tenant and then package and redeploy our app. Let’s do it right now! • Change the App ID URI and the reply...
The Wall Street Journal
Are We Winning?
High-profile breaches continue, from DNC and Equifax to Facebook and Under Armour. Malware and ransomware grind businesses to a halt, and vulnerabilities face utilities and other infrastructure. What's the score in the battle over...
Brainwaves Video Anthology
Pia Avolio de Martino - Kidlink
Pia Avolio de Martino, Milan, Italy is the Vice Chairman of Kidlink.
Science360
Science Now Episode 7
This episode explores an innovative new monitoring software that allows diabetics with chronic foot ailments to track and monitor their condition at home, and a vast collection of subglacial lakes hidden deep beneath the West Antarctic...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...
IDG TECHtalk
Is end-to-end encryption for videoconferencing important?
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular...
IDG TECHtalk
Your Windows 10 1903 questions answered | TECH(talk)
You asked (questions about Windows 10) and we answered (with advice from Windows expert Preston Gralla). We cover everything from the pace of annual updates, how to find better Windows apps and why you should change your default browser.
Curated Video
DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Spring Boot Basic Server Code
You will be able to code some basic server side code for the controller and be able to add the test cases. This clip is from the chapter "Development (Code, Test, Review and Merge)" of the series "DevOps with GIT(Flow) Jenkins,...
Curated Video
High Performance Scientific Computing with C 1.4: Numerical Integration
How can we calculate integrals with a computer? How can we solve differential equations? • Calculate integrals with the trapezoid and Simpson’s rule • See how the error terms scale with different algorithms • Solve differential equations...
Curated Video
High Performance Scientific Computing with C 3.2: Pipelining and Hardware-Oriented Design
How can we design our programs to take the most advantage of modern CPU design? • Learn about caching • Learn about branch prediction and speculative execution • Stay out of the way of the CPU and compiler!
Curated Video
Cloud Native Development on Azure with Java 2.5: Build and Deploy a New Azure App Service Instance
In this video, we will create an Azure web application hosted within the Azure App Service. We will configure it such that it will be compatible for hosting our Java Spring Boot application. • Add a new web application • Deploy a default...