Curated Video
Learning D3.JS 5.0 3.4: Creating Text Paths
In this video, we will learn how to create text paths. • Explain what is and the benefits of using it • Code one rectangle using • Code multiple rectangles using the element
Curated Video
Bug Bounty Program Certification 12.1: About Android App Backend Penetration
In this video, you will get a brief overview on the Android app backend penetration. • Explore the backend penetration techniques • Learn about the process of backend penetration • Have a look at the goals of backend penetration
Curated Video
Bug Bounty Program Certification 6.1: About Malware Attacks on Machines
This video is about malware attacks. • Malware attack overview • Explore listing of malware attacks • Penetrate using malware attacks
Curated Video
Bug Bounty Program Certification 2.1: Download and Install VMware Workstation
In this video, learn about the installation process of VMware. • Explore About VMware • Download VMware • Installation of Vmware
Curated Video
Bug Bounty Program Certification 1.3: Teaser – Finding Bugs in Websites and Gain Bug Bounty
This video explores example of bug bounty. • Explore injection attack • Learn about manual commands • Exploit database
NASA
Student Scientists: Building REXIS
College students in Boston are getting the chance to help NASA explore an asteroid. These student scientists have built an instrument called REXIS, which will fly on the OSIRIS-REx spacecraft that is scheduled to launch later in 2016....
Curated Video
Complete Modern C++ - Sharing Pointers
In this video, we will build an example that will be used to explain why we std::unique_ptr cannot be used in all cases. • Go through the Qt documentation • Understand that signals get emitted when something happens • Learn that slots...
Curated Video
Hands-On Auto DevOps with GitLab CI - Autoscaling Runners Using Cloud Resources
To support many projects and builds in our custom CI infrastructure, we need a way to scale runners up or down automatically. • Use Ansible to provision a Docker Machine runner • Configure our Docker Machine runner with AWS credentials •...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Risk Monitoring Tools
This video explains risk monitoring tools. This clip is from the chapter "Risk Monitoring and Control" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk monitoring and control.
Curated Video
Mastering Tableau 2018.1, Second Edition 5.8: Understanding Aggregations
We’ll start with data aggregation. • Different types of data aggregations • Aggregate data in Tableau
Curated Video
Serverless JavaScript Projects 3.4: Test That SMS Messages Are Being Sent and Received to and from IBM Watson
We need to make sure this application works correctly. • Send several greetings to make sure Watson responds • Send several conversation closing words like ‘goodbye’ to test that the responses are appropriate • Send several conversation...
Curated Video
Serverless JavaScript Projects 3.2: Build a Twilio and IBM Watson AWS Lambda
We need to create a middleware function API in AWS Lambda that the twilio project will hit as the endpoint for SMS messages. • Build a new Serverless project and deploy it to get the endpoint • Install Twilio as a dependency and create a...
Curated Video
Serverless JavaScript Projects 1.5: Get Going with AWS Lambda FaaS
This video walks the user through building the first ‘Hello World’ application in AWS Lambda. • Write our first application • Run it
Curated Video
Tips, Tricks, and Techniques for Node.js Development 3.5: Async Await Now
In this video, we will learn about async/await. • Learn how to use async await keywords • Transform our code • Execute our code
Curated Video
Tips, Tricks, and Techniques for Node.js Development 3.2: What about Callbacks?
In this video, we will learn to work with callbacks. • Read synchronously • Read a file with callbacks • Check the package
Curated Video
Tips, Tricks, and Techniques for Node.js Development 1.2: Installing Node.js with NVM
In this video, we will learn how to install Node.js and take control of the versions on your machine. • Install NVM • Install node with NVM • Switch from one version to another
Curated Video
Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 9.5: Denial of Service Attack on Websites
This video will help you perform DOS attack using Kali Linux. • Explore Slowloris Program • Download Perl script in Kali Linux • Perform DOS attack using Slowloris program
Curated Video
Cloud Native Development on Azure with Java 4.3: Configure a GitHub Repository and Create a New Pipeline to Set Up CI
This video will walk you through a few simple steps, and show you how to use Git to clone your source code repository and start implementing the CI pipeline for your application. • Configure a GitHub webhook for the Jenkins server •...
Curated Video
The Full Stack Web Development - Installing CouchDB in Linux
Learning CouchDB: Installing CouchDB in Linux This clip is from the chapter "Learning CouchDB" of the series "The Full Stack Web Development".For CouchDB which is also no SQL database, we will checkout Fauxton – a web interface to manage...
NASA
NASA's Hubble Memorable Moments: Comet Impact
In July 1994, the Hubble Space Telescope was poised to use its newly fixed optics to observe one of the most impressive astronomical events of the century - the 21 fragments of Comet Shoemaker-Levy 9 impacting Jupiter. But these...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Pushing Tags to Remote
This video demonstrates the process of pushing tags to remote. This clip is from the chapter "Git Tags" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains the concept Git tags. It also...
Curated Video
Master Microservices with Spring Boot and Spring Cloud - Step 06 – Why is Docker Popular?
This video lets you know why Docker is popular. This clip is from the chapter "Docker with Microservices Using Spring Boot and Spring Cloud – V2" of the series "Master Microservices with Spring Boot and Spring Cloud".This section focuses...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Nmap - 1
This video is part of a 3-part video series where you'll learn about network mapping. This clip is from the chapter "Active Information Gathering and Port Scanning" of the series "The Complete Ethical Hacking Bootcamp: Beginner To...