Curated Video
Bug Bounty Program Certification 5.1: About Network Internal Attack on Server
In this video, explore various network internal attacks. • Learn about network internal attack and listing of attacks • Explore DOS attack and password cracking techniques • Understand server scanning techniques
Curated Video
Dr. Guillermo Martinez Ortiz - Keynote Speech, INET Conference @ King's
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 3 - Dinner Keynote. Dr. Guillermo Martinez Ortiz speaks on the recent economic crisis.
Programming Electronics Academy
We Use Arduino Version .. : Arduino Course 2.2
A walk through of the Arduino IDE version used in the course, and recommendations for getting the most recent version.
Programming Electronics Academy
Ep. 17: Arduino Lie Detectors with Dante Roumega
This week Michael has a chance to chat with Dante Roumega who designed and built his very own Arduino Lie Detector. Dante explains how he came up with such a unique concept (4:25), how his initial product actually made people cry (7:00),...
NASA
NASA | Climate in a Box
Climate modeling requires massive computational power. Until recently, that power required room sized machines with daunting technical and logistic requirements. But new advances in computer design, including hardware and software,...
Curated Video
Ensemble Machine Learning Techniques 5.3: How to Use Stacking
In this video, we will see how stacking can be used to solve machine learning problems. • The viewer will be introduced to the problem at hand • We will then write a stacking implementation • We will combine other algorithms using our...
Curated Video
Mastering Tableau 2018.1, Second Edition 10.3: Dual Layer Mapping
In this video, we’ll see how we can create multiple charts in a single canvas. • Steps to create a Dual Layer Mapping • Implement Dual Layer Mapping
Curated Video
Mastering Tableau 2018.1, Second Edition 8.2: Using Parameters to Create and Control Reference Lines
In this video, we’ll see how to integrate parameters with reference lines. • Add parameters to reference lines
Curated Video
Mastering Tableau 2018.1, Second Edition 5.2: Working with Selection Filters
In this video, we’ll apply measure and dimension filters to our data. • Add filters to data • Understand different types of filters
Curated Video
Mastering Tableau 2018.1, Second Edition 4.4: Creating Charts from Multiple Data Sources
In this video, we’ll see how we can create charts from multiple data sources. • Create charts from join • Create charts with blend • Create charts from Union
Curated Video
Learning D3.JS 5.0 10.1: What is the GeoJSON Format?
In this video, we will learn what the GeoJSON file format is, how to create a GeoJSON file, and how to validate the JSON file. • Understand the GeoJSON file and the difference between JSON and GeoJSON • Learn to create a GeoJSON file •...
Curated Video
Learning D3.JS 5.0 8.1: Adding the x-axis
In this video, we will learn how to add the x-axis. • View the axis on the browser • Solve the problems that occur by adding the x-axis
Curated Video
Learning D3.JS 5.0 1.5: Setting Up a Local Server
In this video, we will see why we need a server, available server options, and creating a local server in our machine. • Understand why you need a server • Explore server options for all platforms • Get a step-by-step guide to create a...
Curated Video
Bug Bounty Program Certification 8.4: Database Attack Using Manual Techniques
This video focuses on manual database attack. • Explore manual database attack • Understand various injection commands to exploit database • Explanation of the manual commands
Curated Video
Bug Bounty Program Certification 7.5: Install Acunetix Web Vulnerability Scanner
This video will help you understand web scanning using Acunetix web vulnerability scanner. • Download Acunetix web vulnerability scanner • Installation of web scanner • Reporting of vulnerabilities
Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Curated Video
Bug Bounty Program Certification 5.5: Perform Brute Force Attack on File Transfer Protocol
This video will help you perform brute force attack on file transfer protocol. • Setup FTP in Windows10 machine • Explore Hydra commands for brute force attack • Learn about brute force attack on FTP to get login credentials
Curated Video
Cloud Native Development on Azure with Java 2.6: Deploy Your App to an Azure App Service Instance
In this video, we will show you how to deploy the Spring Boot app to Azure. So, you will be able to migrate your locally running app to Azure Web Apps. • Created an Azure web application hosted within the Azure App Service • Use the KUDU...
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Next Animation Studio
Newest rover set to launch its mini helicopter on Mars
Mars’ atmosphere is incredibly thin, only 1% of the atmospheric volume of earth, so getting a helicopter to fly in its thin air would be a very big deal.
NASA
Simulated Image Shows the Power of NASA’s WFIRST
NASA’s Wide Field Infrared Survey Telescope, WFIRST, will capture the equivalent of 100 high-resolution Hubble images in a single shot, imaging large areas of the sky 1,000 times faster than Hubble. In several months, WFIRST could survey...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Malware
This video explains the types of malware and what they do. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to protect...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Azure Connectivity - Comparison
In this video, we will cover Azure connectivity-comparison. This clip is from the chapter "Interconnectivity" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section introduces interconnectivity along with benefits...
The Wall Street Journal
Evan Spiegel’s Long Game on Augmented Reality
Snap’s chief executive talks about steering the social media company through economic headwinds while focusing on augmented reality as a long-term strategy.