Curated Video
Tips, Tricks, and Techniques for Node.js Development 4.2: Using Behavior-Driven Development
In this video, we will learn the difference between test-driven development (TDD) and behavior-driven development (BDD) and how we can use BDD. • Understand TDD versus BDD • Use mocha to test our code • Execute our code written with BDD...
Curated Video
Bug Bounty Program Certification 8.3: Find Bug and Hack Database of a Website Using Windows Tools
This video focuses on database attack using Windows tool. • Explore Havij tool • Download and installation of Havij in Windows • Understand Web database penetration using Havij tool in windows
Brainwaves Video Anthology
Dan O'Sullivan - More Education for More People
Dan O’Sullivan is the Associate Dean for Emerging Media at the Tisch School of the Arts and the TBS Chair at ITP. Dan teaches classes about interfaces for your unconscious as well as fundamentals of computer programming. He coined the...
Curated Video
C++ Developer - Getting Started on Windows with Visual Studio Integrated Development Environment (IDE)
This video focuses on getting started on Windows with Visual Studio IDE. This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives of this course.
Curated Video
Multi-Paradigm Programming with Modern C++ - On Development Tools
You only need a compiler and a text editor to begin working with C++. Professional development requires more tools. This video provides an overview of the most important ones. • Hardware and build acceleration • Version control,...
FuseSchool
How to use SMART Notbeook software - SMART tutorials for teachers
Learn how to use the SMART Notebook software!
Curated Video
Mastering MEAN Web Development Expert Full Stack JavaScript (Video 39)
Web development is moving fast and to keep up to mark, you need a technology stack that is . The MEAN stack includes MongoDb, Express, Angular, and Node.js. These tools provide a rich environment to build advanced web applications in a...
Curated Video
Mastering Tableau 2018.1, Second Edition 5.7: Working with Data Labels and the Tooltip
We’ll see data labels and tooltips. • Understand the marks card: data labels and tooltips • Apply labels to data • Apply tooltips to data
Curated Video
Mastering Tableau 2018.1, Second Edition 3.1: Data Preparation and Cleaning Data Sources with Dates and Numbers
In this video, we’ll see how to convert dates and numbers into a usable format. • Understand what clean data is • Select a date using a data source filter • Clean the data
Curated Video
Bug Bounty Program Certification 5.3: Perform Denial of Service Attack on Server
This video will help you understand DOS attack process • Use LOIC tool to perform DOS attack • Attack on other systems in network • Monitor DOS attack using Wireshark
IDG TECHtalk
How tech companies can continue to adapt to remote work demands
Seven months into lockdown and work from home orders, employees have settled into work from home routines. But there’s still plenty of ways companies as a whole can adapt to the shift to a totally remote workforce. Computerworld...
Curated Video
Predictive Analytics with TensorFlow 3.5: Getting Started with Tensorflow – Linear Regression and Beyond
In this example, we will take a closer look at TensorFlow's and TensorBoard's main concepts and try to do some basic operations to get you started. The model we want to implement simulates the linear regression. • Create data into 2D space
Brainwaves Video Anthology
David Held - Maker Spaces
David Held has worked in the field of educational technology for 25+ years at Poughkeepsie Day School, Teachers College and Trinity School (Manhattan). He has created maker spaces and taught making and STEAM integrated classes. David has...
The Wall Street Journal
Alexa, What's Next?
The executive in charge of Kindle, Fire tablets, Fire TV and Alexa talks about Amazon's latest wave of gadgets, and why voice is the next major computing platform. Dave Limp, SVP, Devices and Alexa of Amazon, sits down with WSJ's David...
Curated Video
Ensemble Machine Learning Techniques 6.2: Combining Different Models Together
This video aims to make the user comfortable with creating ensembles of different other ensembles. • We will see that its possible to combine two ensemble models • We will write a python code to test the result of using an ensemble of...
Curated Video
Ensemble Machine Learning Techniques 1.3: Setting Up Python
In this video, we will set up our environment so that we can use python to build ensemble learning models. • Learn about Anaconda and Python • See how to install the Anaconda distribution of Python • Learn about Jupyter notebook
Packt
Advanced Computer Vision Projects 1.3: Google Brain im2txt Captioning Model
In this video, we look at the architecture behind Google Brains im2txt model. • View TensorFlow research Github page • Understand the connection between Inception for classification and LSTMs for caption generation
Curated Video
Java 11 Programming for Beginners 5.4: Using the Date, Time, and Money API
Date/Time and Money are some of the trickier pieces of data to format. We introduce some APIs that greatly help the average Joe to navigate through the complicated waters of proper formatting. • Use the Date/Time API and improve the...
Curated Video
Java 11 Programming for Beginners 2.1: Understanding Mindset Prerequisites
This video tells you what mindset is required from here onwards. • A quick chat on the main mindset prerequisites • Brief description of the example problem
Curated Video
Mastering Tableau 2018.1, Second Edition 8.1: Using Reference Lines
See how to add reference lines in canvas. • Understand the different types of reference lines • Add different reference lines to the canvas
Curated Video
Learning D3.JS 5.0 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Bug Bounty Program Certification 7.4: About Website Bug Bounty Program
In this video, we will learn about web bug bounty program. • Web bug bounty overview • Explore various major web attacks listing • Explanation of major web attacks
Curated Video
Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network
This video explores Trojan creation and infect machines. • Download and install Zirikatu framework in Kali Linux • Create a Trojan file using Zirikatu and transfer it to victim machine • Penetrate victim using the payload
Curated Video
Cloud Native Development on Azure with Java 5.3: Scale and Autoscale the Application
In this video, we will learn how to scale and autoscale our application, which we deployed to Azure Kubernetes cluster. • Clone the source code for metrics server from the Kubernetes GitHub repository • Autoscale the app with more replicas