Hi, what do you want to do?
Curated Video
Apache Kafka - Real-time Stream Processing (Master Class) - Caution with States
In this lecture, we will try to understand the need for repartitioning your Kafka Stream and also learn a method for doing the same.
r/>
This clip is from the chapter "States and Stores" of the series "Apache Kafka - Real-time...
r/>
This clip is from the chapter "States and Stores" of the series "Apache Kafka - Real-time...
Curated Video
Describe an advanced data structure : Rolling Hashes for Constructing a Palindrome
From the section: More Complex Algorithms on Arrays. In this section, we will deal with even more complex problems involving arrays. They will require more complex logic or data structures to solve, or a clever way of applying more...
Mazz Media
Talk It Out: Effects of Weed on Your Body and Brain
Using vintage footage, the program opens with a discussion of how peoples’ attitudes about marijuana have changed dramatically over the years, but the one thing is certain; marijuana changes the way the brain functions. Students will...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Hashing
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+...
Blockchain Central
ABC of Mining - Proof-Of-Work | Blockchain Central
This week on Blockchain Central: we will uncover the science behind the proof of work mechanism - the most popular and one of the most secure in blockchain ecosystem.
Curated Video
Apache Spark 3 for Data Engineering and Analytics with Python - Exposing Bad Records
In this session, we will remove bad records to ensure that we have good quality data.
r/>
This clip is from the chapter "Introduction to Spark SQL and Databricks" of the series "Apache Spark 3 for Data Engineering and Analytics...
r/>
This clip is from the chapter "Introduction to Spark SQL and Databricks" of the series "Apache Spark 3 for Data Engineering and Analytics...
Curated Video
Talk It Out_Effects of Weed On Your Body and Brain
Using vintage footage, the program opens with a discussion of how peoples’ attitudes about marijuana have changed dramatically over the years, but the one thing is certain; marijuana changes the way the brain functions. Students will...
Blockchain Central
What Is Hashing in Blockchain? | Blockchain Central
This week on Blockchain Central: we're going to try and break down the hash and hash functions, as well as explain how it brings blockchain ecosystem to life.
__
'Blockchain Central' is your #1 trusted source for everything crypto. Our...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Authentication
Older network authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and Extensible Authentication...
Blockchain Central
Altcoins and Tokens - Why so Awesome? | Blockchain Central
This week on Blockchain Central: we will explore what is the difference between Altcoins, Tokens and Bitcoin. Although Altcoins are generally built on top of the Bitcoin protocol, some of them have vastly different mechanisms of work....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Autopsy Forensic Browser Lab
Digital forensics is the cross-pollination of computer science and law. In this demonstration, Dan shows how to use the Autopsy forensic tool to work with a disk image to retrieve a deleted file.
r/>
This clip is from the...
r/>
This clip is from the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Gathering Digital Evidence
This episode covers chain of custody, evidence order of volatility, and digital forensics tools used to acquire evidence. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed...
Blockchain Central
What Is Hashing in Blockchain?
This week on Blockchain Central: we’re going to try and break down the hash and hash functions, as well as explain how it brings blockchain ecosystem to life.
Packt
Securely Storing Passwords: Part I
API Authentication and Security (Task App): Securely Storing Passwords: Part I
<
br/>
This clip is from the chapter "API Authentication and Security (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In...
<
br/>
This clip is from the chapter "API Authentication and Security (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - More details on hash collision probability (OPTIONAL)
This video gives a more detailed view on hash collision probability.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section...
Curated Video
Learn and Master C Programming - Using '#define' To Define Symbolic Constants
We will write a program that uses '#define' to define some symbolic constants.
r/>
This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute Beginners!".In this section,...
r/>
This clip is from the chapter "Preprocessor Directives" of the series "Learn and Master C Programming For Absolute Beginners!".In this section,...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Hash Function Overview
This video provides an overview of the hash function.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - How Many Files can Git Store?
This video illustrates the number of files Git can store.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Probability Theory in a Dice Game
This video explains the probability theory in a dice game.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
Curated Video
How to Format Numbers in Excel with Color-Coding and Arrows
This tutorial demonstrates how to format numbers in Microsoft Excel without using conditional formatting. It shows how to display positive numbers in black with an up arrow and negative numbers in red with a down arrow. By...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - SHA-1 Hash Function
This video explains the SHA-1 hash function.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to initialize a...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Git Hash Collision Probability
This video explains the Git hash collision probability.
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
r/>
This clip is from the chapter "How Git Works Under the Hood" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...