The Wall Street Journal
Inside Samsung's Skunk Works
Samsung NEXT President David Eun discusses the outlook for Samsung's venture capital arm and what investment areas it is looking at in an interview with WSJ's Senior Editor Yun-Hee Kim at the WSJ D.Live conference in Laguna Beach, Calif.
Curated Video
Java 11 Programming for Beginners 4.5: Managing the Input/OutputJava 11
The I/O for Java is one area that is very useful but also very tricky. This video aims to give that landscape a good overview. • Slides will highlight the classes and methods to look out for • Add the capability to read a sentence from...
Curated Video
Learning D3.JS 5.0 7.3: Breaking Down Scales
In this video, we will learn what scales are and why we need them. • Identify the problem • Understand what the scale function is • Get to know about range and domain
Packt
Jest Testing Framework
Testing Node.js (Task App): Jest Testing Framework This clip is from the chapter "Testing Node.js (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will learn about sending emails.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem. This clip is from the chapter "Physical Security" of the series "CompTIA...
Curated Video
Ensemble Machine Learning Techniques 3.2: How Bagging Works
This video aims to teach the viewer how to use Bootstrapping for Ensemble Learning. • We go into the details of application of Bootstrapping for ensemble Learning • Use understand about Bootstrap aggregating • Look at the Algorithm for...
Curated Video
Ensemble Machine Learning Techniques 2.2: Ensemble Learning for Classification
This video aims to teach the viewer how to use Ensemble Learning for Classification. • We go into the details of Majority Voting • We see examples for majority voting in real life • Look at other combination techniques
Curated Video
Python for Network Forensics 2.2: Populating File Properties
In this video, we will learn to populate properties of files such as permissions and timestamps. • Understand how to populate file properties • Populate and examine file permissions • Learn and query the different available timestamps of...
Curated Video
Java 11 Programming for Beginners 4.2: Controlling Flows and Logical Operators
Introduce various control flows and conditional operators. • Two slides to introduce the concepts • A coding example to showcase control flows • Improve the code with the use of switch-case and for loops
Curated Video
Java 11 Programming for Beginners 2.3: Creating the Basic Structure, Basic Class
Then, we prepare even more of the basic structure to hold the upcoming logic. • Create a new calculator class and initial method • Run through the basic structure of a Java class
Curated Video
Mastering Tableau 2018.1, Second Edition 10.2: Develop Geographic Visualizations Using Colors, Shapes, and Filtering
In this video, we’ll see how we can use the Shape file in Tableau and also apply filters and colors. • Use color to filter data • Explain how analytics improves decision-making • Talk about the kinds of data you’ll deal with
Curated Video
Learning D3.JS 5.0 5.1: The data() and enter() Methods
In this video, we will learn what data binding is and how to use the data() and enter() methods. • Learn what data binding is • Get an example with data() and enter() methods • View the result in the browser and discuss it
Curated Video
Bug Bounty Program Certification 6.3: Create a Virus and Infect the Machines in Network
In this video, you will learn about virus creation and infect machines. • Download and install Fatrat framework in Kali Linux • Create a virus file using Fatrat and transfer it to victim machine • Exploit victim using that virus
Curated Video
Cloud Native Development on Azure with Java 3.2: Register Your App with Your Azure Active Directory Tenant
One of the key steps to securing our app is to register it with our Azure Active Directory tenant. Let’s go ahead and see how to do this! • Test anonymous access for the application • Add other users to the Azure subscription and define...
NASA
Small Steps, Giant Leaps: Episode 63, OSIRIS-REx Asteroid Mission Small Steps, Giant Leaps
OSIRIS-REx Principal Investigator Dante Lauretta discusses the NASA mission to near-Earth asteroid Bennu.
Curated Video
Describe an advanced data structure : The Course Overview
From the section: Doing a Lot with Very Little. In this section, we will explore some problems that look difficult to solve efficiently at first sight. You might think that they require some advanced logic or data structures, but in fact...
Science360
All-in-one weather and crop monitor delivers agricultural insight to farmers – CES 2018
NSF-funded small business Arable Labs has developed a crop and weather sensor that delivers real-time, precision weather information straight to the hands of farmers in the field. The technology packs sensors into portal devices that...
Science360
Science Of Shopping: Cameras And Software That Track Our Shopping Behavior
Go into any grocery store and cameras may be watching you. These cameras are not looking for thieves, they're looking for shoppers! The cameras are focused on the tops of peoples' heads (so it's anonymous), but they don't have to see...
Curated Video
High Performance Scientific Computing with C 4.2: Shared Memory Parallelism with OpenMP
How can we easily use our multi-core systems with more than one thread? • Learn how to parallelize loops with OpenMP • Learn how to change the number of threads • Learn how to use reductions to finalize calculations
Curated Video
Tips, Tricks, and Techniques for Node.js Development 4.2: Using Behavior-Driven Development
In this video, we will learn the difference between test-driven development (TDD) and behavior-driven development (BDD) and how we can use BDD. • Understand TDD versus BDD • Use mocha to test our code • Execute our code written with BDD...
Curated Video
Bug Bounty Program Certification 8.3: Find Bug and Hack Database of a Website Using Windows Tools
This video focuses on database attack using Windows tool. • Explore Havij tool • Download and installation of Havij in Windows • Understand Web database penetration using Havij tool in windows
Brainwaves Video Anthology
Dan O'Sullivan - More Education for More People
Dan O’Sullivan is the Associate Dean for Emerging Media at the Tisch School of the Arts and the TBS Chair at ITP. Dan teaches classes about interfaces for your unconscious as well as fundamentals of computer programming. He coined the...
Curated Video
Multi-Paradigm Programming with Modern C++ - On Development Tools
You only need a compiler and a text editor to begin working with C++. Professional development requires more tools. This video provides an overview of the most important ones. • Hardware and build acceleration • Version control,...
Curated Video
C++ Developer - Getting Started on Windows with Visual Studio Integrated Development Environment (IDE)
This video focuses on getting started on Windows with Visual Studio IDE. This clip is from the chapter "Getting Started" of the series "The Complete C++ Developer Course".This section introduces the learning objectives of this course.