Instructional Video9:12
Curated Video

Design a computer system using tree search and reinforcement learning algorithms : Creating a Bandit with 4 Arms Using Python and Numpy

Higher Ed
From the section: The Multi-Armed Bandit. In this section, we will learn about the basics and look at one of the most foundational concepts in Reinforcement Learning – The Multi-Armed Bandit We construct a model of a MAB environment from...
Instructional Video5:02
Curated Video

Predictive Analytics with TensorFlow 11.1: Reinforcement Learning

Higher Ed
Supervised and unsupervised learning appears at opposite ends of the spectrum, RL exists somewhere in the middle. We use reinforcement learning to discover a good sequence of actions to take the maximum expected rewards. We will also see...
Instructional Video7:34
Curated Video

Mass Media: Functionalist

9th - 12th
A general introduction to the Functionalist perspective on Mass Media.
Instructional Video1:32
The Business Professor

Agency Theory and Stakeholder Theory

Higher Ed
Agency Theory and Stakeholder Theory
Instructional Video10:02
Curated Video

Predictive Analytics with TensorFlow 11.2: Developing a Multiarmed Bandit's Predictive Model

Higher Ed
One of the simplest RL problems is called n-armed bandits. The thing is there are n-many slot machines but each has different fixed payout probability. The goal is to maximize the profit by always choosing the machine with the best...
Instructional Video10:04
Institute for New Economic Thinking

Giovanni Dosi -- The Survival of the Riskiest

Higher Ed
Financial fragility does not fall from the sky. That's why treating risk as if it comes from exogenous shocks can't capture the reality of financial markets. In Giovanni Dosi's models, systemic risk is inherent to the financial system...
Instructional Video15:42
Curated Video

Design a computer system using tree search and reinforcement learning algorithms : Coding up Your First Solution to CartPole-v0

Higher Ed
From the section: Lights, Camera, Action – Building Blocks of Reinforcement Learning. In this section, we learn about the main building blocks of reinforcement learning, including the action space, the environment, and the rewards. To...
Instructional Video3:28
Packt

Design a computer system using tree search and reinforcement learning algorithms : Understanding the Environment of CartPole in OpenAI Gym

Higher Ed
From the section: Lights, Camera, Action – Building Blocks of Reinforcement Learning. In this section, we learn about the main building blocks of reinforcement learning, including the action space, the environment, and the rewards. To...
Instructional Video1:35
The Business Professor

Types of Principal in an Agency Relationship

Higher Ed
Types of Principal in an Agency Relationship
Instructional Video7:29
Curated Video

Design a computer system using tree search and reinforcement learning algorithms : Running a Visualization of the Cart Robot CartPole-v0 in OpenAI Gym

Higher Ed
From the section: Getting Started With Reinforcement Learning Using OpenAI Gym. In this section, we will introduce the basics of the reinforcement learning problem, and explain how OpenAI gym helps with developing and research solutions...
Instructional Video10:11
Curated Video

Design a computer system using tree search and reinforcement learning algorithms : Creating an Agent to Solve the MAB Problem Using Python and Tensorflow

Higher Ed
From the section: The Multi-Armed Bandit. In this section, we will learn about the basics and look at one of the most foundational concepts in Reinforcement Learning – The Multi-Armed Bandit We construct a model of a MAB environment from...
Instructional Video11:36
Weird History

What Life Is Like as a Secret Service Agent

12th - Higher Ed
The people who undertake Secret Service training keep presidents, vice presidents, first families, and even candidates safe. But their own lives can be incredibly dangerous. The Secret Service agent job description includes both...
Instructional Video6:23
Curated Video

Design a computer system using tree search and reinforcement learning algorithms : Training the Agent, and Understanding What It Learned

Higher Ed
From the section: The Multi-Armed Bandit. In this section, we will learn about the basics and look at one of the most foundational concepts in Reinforcement Learning – The Multi-Armed Bandit We construct a model of a MAB environment from...
Instructional Video3:17
The Business Professor

Vicarious Liability for Torts of an Agent

Higher Ed
Vicarious Liability for Torts of an Agent
Instructional Video4:21
Fun Robotics

Unsupervised Learning and Clustering

Higher Ed
Introduce and define the concept of unsupervised learning
Instructional Video2:34
The Business Professor

Duties Owed Between a Principal and Agent

Higher Ed
Duties Owed Between a Principal and Agent
Instructional Video3:00
The Business Professor

Principal Liable for Torts of an Agent

Higher Ed
Principal Liable for Torts of an Agent
Instructional Video1:22
The Business Professor

Perfection of Security Interest by Possession

Higher Ed
Perfection of Security Interest by Possession
Instructional Video2:43
The Business Professor

Agency Law (Intro)

Higher Ed
Overview of Agency Law (Intro)
Instructional Video1:12
The Business Professor

Understanding Agency Relationships

Higher Ed
This video explains the concept of agency in business law. Discover the roles of the principal and the agent, and how the agent acts on behalf of the principal with some level of authorization. Learn about the responsibilities and...
Instructional Video3:25
The Business Professor

What are Business Entities?

Higher Ed
What are Business Entities?
Instructional Video3:29
The Business Professor

Understanding the End of Principal-Agent Dynamics

Higher Ed
This video discusses the various ways in which an agency relationship can end or terminate. The termination can occur through mutual agreement, expiration of a specified period, completion of a specific task, or occurrence of a...
Instructional Video8:52
Curated Video

DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Setup SSH and Maven Settings for Jenkins User

Higher Ed
In this video, you will be able to configure the Jenkins user for SSH and maven integration. This clip is from the chapter "Continuous Integration and Continuous Deploy" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar,...
Instructional Video0:58
The Business Professor

Liability on Negotiable Instrument by Agent Indorser

Higher Ed
Liability on Negotiable Instrument by Agent Indorser