Curated Video
Disaster Recovery Planning: Ensuring Business Continuity
Business continuity ensures that business processes can continue despite interruptions. Continuity of Operations (COOP), Disaster Recovery Plans (DRPs), as well as hot, warm, and cold alternate sites are discussed.
This clip is from...
IDG TECHtalk
What is quantum computing? Its evolution, uses cases and how to access it
You may have heard of quantum computing, but what is it, and what problems can it solve? Plus, what makes quantum computing different from classical computing, and how can enterprises access and harness the technology? Serdar Yegulalp,...
The Wall Street Journal
Anticipating the Next Big Security Threat
Cybersecurity experts Cheryl Davis and David Koh speak with WSJ Senior Editor Yun-Hee Kim about emerging security threats and how to protect businesses from cyberattacks.
Curated Video
Describe the different types of malware that could affect a computer system or network : Backdoors
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
Animation and Persistence of Vision
Animation is a common effect used in cartoons and videos that allows us to perceive movement in still images. Let's look at some common animation techniques to see how they trick our minds. Illusions part 6/11
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 7
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Programming Electronics Academy
Arduino Toolchain: Arduino Course 2.7
A high level description of the software tools used to get the code you write on an Arduino board.
Science360
Visualization Wall
A giant video screen that takes up an entire wall, floor to ceiling, is allowing scientists to see details they've never seen before. Developed at Tufts University with help from the National Science Foundation, the Visualization Wall...
Curated Video
Ensemble Machine Learning Techniques 3.3: Making Predictions on Movie Ratings Using SVM
In this video, we will use Python to implement the Bagging technique using SVM. • We will use Jupyter Notebook to execute our code • Use Movie Rating to perform classification • Implement Bagging in python for classification
Curated Video
Learning D3.JS 5.0 6.1: Get Started with Bars
In this video, we will learn how to create a basic bar graph. • Understand the code and add more code to the given files • Understand how it’s done manually and how it’s done on D3.js • View the result with the developers’ tools
All In One Social Media
The COMPLETE Real Estate Agent's Live Streaming Guide (2021)
In a world where human interaction is discouraged and digital mediums thrive, this video will give the complete live streaming guide for Real Estate Agents!
Curated Video
Describe the different types of malware that could affect a computer system or network : Downloaders
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
APMonitor
Introduction to OT Cybersecurity
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
Curated Video
Bug Bounty Program Certification 11.1: About Android App Frontend Penetration
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Curated Video
Bug Bounty Program Certification 1.1: The Course Overview
This video provides an overview of the entire course.
Packt
Compare the breadth-first and depth-first search algorithms : Installation and Setup
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title. • Download python, Graphviz, and Pip. • Run the installer and install these...
The Wall Street Journal
CEOs Of Automation Anywhere And UiPath On Robotic Process Automation
Daniel Dines and Mihir Shukla discuss how to get the most out of business process automation investments.
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Software development methodologies part 2
CISM Domain 1: Information Security Governance: Software development methodologies part 2 This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
National Institute of Standards and Technology
Vint Cerf: The past, present and future of the internet
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Curated Video
Tips, Tricks, and Techniques for Node.js Development 5.4: Node Process Manager
In this video, we will see how to use a process manager to keep our Node.js applications up and running. • Get an introduction to node process manager • Show strongloop • Show pm2
Curated Video
Predictive Analytics with TensorFlow 9.2: Implementing an RNN for Spam Prediction
We will see how to implement an RNN in TensorFlow to predict spam/ham from texts. • Construct RNN network • Perform the training • Plot accuracy over time
Programming Electronics Academy
Which Arduino IDE should I use?
Did you know that the Arduino company provides for free three different tools for programming your Arduino board? They're called Integrated Development Environments or IDEs. If you're trying to figure out which one you should use, then...