Instructional Video7:20
Curated Video

Serverless JavaScript Projects 4.1: Creating the UI by Building a Good Front End with Drag and Drop Tiles

Higher Ed
This video covers a usable front end UI that works for people to visualize a SCRUM or KANBAN board. • Set up an HTML template with Bootstrap and jQuery • Link the jQuery UI Library for drag and drop functionality • Build a UI that has...
Instructional Video9:14
Curated Video

High Performance Scientific Computing with C 3.3: Vectorizing with AVX

Higher Ed
How can we use automatic vectorization to speed up our code? What vectorization options currently exist? • Learn about the history of vector instructions • Learn how to compile with AVX/AVX2 • Learn about the latest AVX-512 instruction set
Instructional Video6:36
Curated Video

Tips, Tricks, and Techniques for Node.js Development 5.1: Process Environment Variables

Higher Ed
In this video, we will learn why and how we can use environment variables, as well as how to manage these variables. • Show how environment variables work • Load variables from .env files • Show node-env-run
Instructional Video3:19
Curated Video

Learning D3.JS 5.0 5.2: Function in Methods

Higher Ed
In this video, we will learn to add functions to methods to make them more dynamic. • Add a function in the text method • Create the style method • Add a function and an if-else statement in the style method
Instructional Video10:50
Curated Video

Bug Bounty Program Certification 9.4: Forge Request Attack on Websites

Higher Ed
In this video, you will perform cross site request forgery attack on website. • Setup Lab setup using Mutillidae Buggy web application for forgery attack • Learn from the example of Force someone to add a blog without consent • Learn...
Instructional Video6:36
Curated Video

Bug Bounty Program Certification 4.1: Bugs Overview in Networks As External Attacker

Higher Ed
In this video, we will find bugs in networks as external attacker. • Explore wireless attack process as an attacker • Learn about pre-attack phase of external attack • Learn about post attack phase of external attack
Instructional Video12:57
Curated Video

Cloud Native Development on Azure with Java 5.2: Deploying Multi-Container Application to Azure Kubernetes Service

Higher Ed
Now that you know what Kubernetes is, we are all ready to get our hands dirty! In this video, we will deploy a multi-container application to Azure Kubernetes Service. • Configure an existing service principle and use it to manage the...
Instructional Video1:14
Next Animation Studio

FBI tricked international cartels into using ‘encrypted’ phones

12th - Higher Ed
The huge surveillance operation started years ago, when a convicted drug smuggler offered the ‘back door’ of his special new gangster phone to the FBI.
Instructional Video1:41
Science360

Anchovi Labs

12th - Higher Ed
An introduction to Anchovy Labs, a team specialising in image annotation and analysis software at the California Institute of Technology.
Instructional Video4:23
IDG TECHtalk

How to securely prepare for Adobe Flash end of life on Windows 10

Higher Ed
Microsoft will soon discontinue support for Adobe Flash. Here’s how to transition to secure alternatives while blocking unsafe use of Flash.
Instructional Video4:49
IDG TECHtalk

Security considerations for remote workers

Higher Ed
Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.
Instructional Video1:18
XKA Digital

It's important to make a difference

Higher Ed
Nigel was appointed in April 2002 to head up the BBC's training and development operation, where he built one of the most successful learning and development operations in the UK. This included an award-winning leadership programme,...
Instructional Video5:16
Curated Video

Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares

Higher Ed
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Instructional Video7:10
Curated Video

Python for Network Forensics 5.3: Exploitation

Higher Ed
Once an attack vector has been found we will proceed with exploitation to take over the system. • Learn about a common attack vector through exploitable web services • Develop a Python-based reverse shell to gain access into the system •...
Instructional Video8:51
Curated Video

Python for Network Forensics 1.5: Introduction to Impacket

Higher Ed
In this video, we will add breadth to our Python capability to extend functionality using Impacket. • Further expand our application to import Impacket • Decode raw packets using Impacket • Get a better understanding of encapsulation and...
Instructional Video3:28
Packt

Advanced Computer Vision Projects 3.4: Videos and Retraining

Higher Ed
In this video, we’ll briefly cover how to extend the model to handle videos and how to retrain the model. • See that we can apply algorithms to videos by running frame-by-frame • Briefly go over instructions to retrain on existing or new...
Instructional Video2:21
Packt

Advanced Computer Vision Projects 1.1: The Course Overview

Higher Ed
This video shows an entire overview of the course.
Instructional Video3:10
Curated Video

Mastering Tableau 2018.1, Second Edition 8.4: Clustering Data in Tableau

Higher Ed
In this video, we’ll see how to cluster data in Tableau. • Understand clusters • Implement clustering in Tableau
Instructional Video4:27
Curated Video

Mastering Tableau 2018.1, Second Edition 3.3: Using the Data Interpreter

Higher Ed
In this video, we’ll see the data interpreter in action. • Load the dataset into Tableau • Apply the data interpreter to the data
Instructional Video6:31
Curated Video

Tips, Tricks, and Techniques for Node.js Development 5.3: Clustering

Higher Ed
Node.js is running a single process on a CPU, wasting other cores. Luckily for us, Node.js has a module to solve this for us and let us use multi-core. In this video, we will learn how to use this module. • Explain cluster module • Use...
Instructional Video3:56
Curated Video

Learning D3.JS 5.0 10.4: Make It More Functional

Higher Ed
In this video, we will add another JSON file with cities, population, longitude, and latitude, and make the cities visible. • Add the new JSON file • Add code to make the cities visible • View the result
Instructional Video3:42
Curated Video

Learning D3.JS 5.0 8.6: Adding Visual Information

Higher Ed
In this video, we will create an area chart using the line chart. • Add some code to make the data more readable • Understand the area chart • Add the area chart
Instructional Video2:50
Curated Video

Learning D3.JS 5.0 7.5: Working with Arrays

Higher Ed
In this video, we will use arrays to simulate real-life examples. • Go through the array documentation • Use the array and alternate the domain() in the code • Use the console to check whether the result is correct
Instructional Video3:14
Curated Video

Learning D3.JS 5.0 2.1: What Is an SVG?

Higher Ed
In this video, we will learn about SVG, what it is, where we use it, what we can do with it, its advantages/disadvantages, and how D3.js handles them. • Understand the definition of SVG • Learn the properties of SVG • Know when we should...