Instructional Video9:32
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Caution with States

Higher Ed
In this lecture, we will try to understand the need for repartitioning your Kafka Stream and also learn a method for doing the same.
r/>
This clip is from the chapter "States and Stores" of the series "Apache Kafka - Real-time...
Instructional Video11:24
Curated Video

Describe an advanced data structure : Rolling Hashes for Constructing a Palindrome

Higher Ed
From the section: More Complex Algorithms on Arrays. In this section, we will deal with even more complex problems involving arrays. They will require more complex logic or data structures to solve, or a clever way of applying more...
Instructional Video13:13
Mazz Media

Talk It Out: Effects of Weed on Your Body and Brain

6th - 8th
Using vintage footage, the program opens with a discussion of how peoples’ attitudes about marijuana have changed dramatically over the years, but the one thing is certain; marijuana changes the way the brain functions. Students will...
Instructional Video8:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Hashing

Higher Ed
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Instructional Video5:20
Blockchain Central

ABC of Mining - Proof-Of-Work | Blockchain Central

Higher Ed
This week on Blockchain Central: we will uncover the science behind the proof of work mechanism - the most popular and one of the most secure in blockchain ecosystem.
Instructional Video5:39
Curated Video

Apache Spark 3 for Data Engineering and Analytics with Python - Exposing Bad Records

Higher Ed
In this session, we will remove bad records to ensure that we have good quality data.
r/>
This clip is from the chapter "Introduction to Spark SQL and Databricks" of the series "Apache Spark 3 for Data Engineering and Analytics...
Instructional Video13:13
Curated Video

Talk It Out_Effects of Weed On Your Body and Brain

K - 8th
Using vintage footage, the program opens with a discussion of how peoples’ attitudes about marijuana have changed dramatically over the years, but the one thing is certain; marijuana changes the way the brain functions. Students will...
Instructional Video5:11
Blockchain Central

What Is Hashing in Blockchain? | Blockchain Central

Higher Ed
This week on Blockchain Central: we're going to try and break down the hash and hash functions, as well as explain how it brings blockchain ecosystem to life. __ 'Blockchain Central' is your #1 trusted source for everything crypto. Our...
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Authentication

Higher Ed
Older network authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and Extensible Authentication...
Instructional Video5:51
Blockchain Central

Altcoins and Tokens - Why so Awesome? | Blockchain Central

Higher Ed
This week on Blockchain Central: we will explore what is the difference between Altcoins, Tokens and Bitcoin. Although Altcoins are generally built on top of the Bitcoin protocol, some of them have vastly different mechanisms of work....
Instructional Video5:01
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Autopsy Forensic Browser Lab

Higher Ed
Digital forensics is the cross-pollination of computer science and law. In this demonstration, Dan shows how to use the Autopsy forensic tool to work with a disk image to retrieve a deleted file.
r/>
This clip is from the...
Instructional Video9:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Gathering Digital Evidence

Higher Ed
This episode covers chain of custody, evidence order of volatility, and digital forensics tools used to acquire evidence. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video10:13
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking

Higher Ed
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Instructional Video5:11
Blockchain Central

What Is Hashing in Blockchain?

Higher Ed
This week on Blockchain Central: we’re going to try and break down the hash and hash functions, as well as explain how it brings blockchain ecosystem to life.
Instructional Video11:29
Packt

Securely Storing Passwords: Part I

Higher Ed
API Authentication and Security (Task App): Securely Storing Passwords: Part I
<
br/>
This clip is from the chapter "API Authentication and Security (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In...
Instructional Video27:13
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - More details on hash collision probability (OPTIONAL)

Higher Ed
This video gives a more detailed view on hash collision probability.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
Instructional Video6:35
Curated Video

Learn and Master C Programming - Using '#define' To Define Symbolic Constants

Higher Ed
We will write a program that uses '#define' to define some symbolic constants.
r/>
This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute Beginners!".In this section,...
Instructional Video3:29
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Hash Function Overview

Higher Ed
This video provides an overview of the hash function.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Instructional Video4:09
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - How Many Files can Git Store?

Higher Ed
This video illustrates the number of files Git can store.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Instructional Video4:11
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Probability Theory in a Dice Game

Higher Ed
This video explains the probability theory in a dice game.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Instructional Video7:57
Curated Video

How to Format Numbers in Excel with Color-Coding and Arrows

Pre-K - Higher Ed
This tutorial demonstrates how to format numbers in Microsoft Excel without using conditional formatting. It shows how to display positive numbers in black with an up arrow and negative numbers in red with a down arrow. By...
Instructional Video10:18
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - SHA-1 Hash Function

Higher Ed
This video explains the SHA-1 hash function.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a...
Instructional Video5:56
Curated Video

Complete Git Guide: Understand and Master Git and GitHub - Git Hash Collision Probability

Higher Ed
This video explains the Git hash collision probability.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...