Programming Electronics Academy
What is Serial.begin(9600)?
WHAT IS SERIAL.BEGIN(9600)? Are you wondering what Serial.begin(9600) does? You’ve probably seen it in most of the Arduino programs you’ve looked at – but what’s it there for?! Do you even need to use Serial.begin()? What if you change...
Packt
Describe a data structure : What Are Data Structures and Why Are They Important?
From the section: Introduction to Data Structures and Important Concepts. This section introduces Data Structures and important concepts of DS and explains why they are important Introduction to Data Structures and Important Concepts:...
Packt
Introduction to computer hardware and software : Inside the PC
From the section: The Visible Computer. In this section, we learn more about primary PC computer, external connections and learn more about computer. Geeks go into PC cases and this episode is a case in point, if you’ll pardon the pun....
Institute for New Economic Thinking
Yvo Desmedt: Much Ado About Cyber Security
Private data is leaked more and more in our society. Wikileaks, Facebook, and identity theft are just three examples. Network defenses are constantly under attack from cyber criminals, organized hacktivists, and even disgruntled...
Paul Marriott
Tutorial: Automatic Smart Fan Step-by-Step w/Arduino Nano, Shield, DHT11, Relay Switch & mBlock 5
Full-fledged tutorial (with diagrams) for an automated smart fan prototype system. Fan is programmed to turn on and off when temperature sensor reaches a certain temperature. Uses Arduino Nano microcontroller with a special connectivity...
FuseSchool
Get to know your smartboard - SMART tutorials for teachers - the virtual school
Find out what the Buttons on your SMART Board can be used for to master all of its functions!
Kids’ Poems and Stories With Michael Rosen
Don't - Kids Poems and Stories With Michael Rosen
Michael Rosen performing the poem Don't. This poem comes from ‘Mustard, Custard, Grumble Belly and Gravy’ (Bloomsbury Children’s Books).
All In One Social Media
How To Boost Posts On Facebook
How To Boost Posts On Facebook // You spend a lot of time creating content to share on Facebook. But with the decline of organic reach, are you seeing enough return on that investment? This is where the Facebook boost post feature comes...
Programming Electronics Academy
Display Arduino output (e.g. sensor data) on your computer monitor with this simple function: Part 1
In many cases while using an Arduino, you will want to see the data being generated by the Arduino. One common method of doing this is using the print() function from the Serial library to display information to your computer’s monitor....
Curated Video
Influences on Business Mission and Objectives
This video is a lecture presentation that discusses the influences on a business's mission and objectives. The presenter provides a recap of the differences between mission, objectives, and strategy, and uses the analogy of chess to...
National Institute of Standards and Technology
Password Security Fatigue
Ever get tired of having to update your username and password? In this video, Mary Theofanos explains the idea of security fatigue and how users are bogged down by too many decisions involving their online security. Creating awareness...
Paul Marriott
Tutorial: How a 7-Segment Display works w/Arduino Uno
Originally part of a live school podcast, this tutorial demonstration shows you how a 7-segment display works. Use of Arduino Uno microcontroller, half breadboard and a common cathode 7-segment display module.
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Hardware architecture
CISSP Domain 3: System Architecture and Engineering: Hardware architecture. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Programming Electronics Academy
Tiny Arduino Compatible GPS Car Tracker :: James Bond Wanna Be
Isn’t it hard to finish watching a spy movie and not want to do something...spy-like? You know, like having 40 video cameras in your house, dancing the tango with some ambassador, or jumping off a helicopter onto a wild cheetah? Well -...
Science360
The future of encryption
With so much of our information now stored or processed in the cloud, how can we make sure our data is safe from unauthorized access? The National Science Foundation is funding researchers working to develop new, more robust encryption...
Science360
Researchers explore how babies learn! NSF Science Now 30
In this week’s episode, we explore how babies learn, discover what is threatening coral reefs, see how coffee house hackers are stealing computer data and, finally, we explore our memories. Check it out!
Packt
State the purpose of network hardware : Hexadecimal
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. The central box that connects devices on our LANs has gone through many advancements over the years. Whether hubs or...
Institute for New Economic Thinking
Domenico Delli Gatti - Microfoundations for the Vision of Minsky
Delli Gatti starts where his dissertation advisor, Hyman Minsky, left off. With tools from network theory and agent-based modeling, he simulates the economy as enormous web of credit relations. He says agent-based models can capture a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Shells
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Science360
Mind Reading Computer System May Help People With Locked-In Syndrome
Imagine living a life in which you are completely aware of the world around you but you're prevented from engaging in it because you are completely paralyzed. Even speaking is impossible. For an estimated 50,000 Americans this is a harsh...
The Wall Street Journal
The Future of Mobility
Toyota Chairman Takeshi Uchiyamada and WSJ Tokyo Bureau Chief Peter Landers discuss the future of transportation technology and its effects on the world around us.
Science360
Computer scientist Anthony Joseph - ScienceLives
The Cold War may be over, but silent dangers still lurk in cyber space. With increasing amounts of sensitive personal information — social security numbers, financial data, stock transactions — finding its way onto computing networks,...
Science360
Climate Models - How Do We Know?
How are climate models on climate change being improved?
IDG TECHtalk
How to set up email security rules in Microsoft Office 365
Microsoft has rolled out new security settings for Office 365, but the default configuration for email might not be right for your organization.