Instructional Video2:55
SciShow

Brain vs. Computer

12th - Higher Ed
The brain of luchador Hanko wants to take on the worlds fastest supercomputer, "K," in a cage match for bragging rights - which one is the most impressive information processor?
Instructional Video2:45
Curated Video

Binary: The Computer Language

6th - 12th
We use binary every day – although we might not know it. Find out how this number system is used in computers to store large amounts of data. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video3:07
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Solution - Use Assembly to Run Byte Conversions

Higher Ed
In this video, we will discuss the solution to the exercise on using Assembly to run byte conversions from the previous video.
<
br/>
This clip is from the chapter "Learn Advanced Solidity II" of the series "The Complete Solidity...
Instructional Video11:38
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - How to Write Assembly in Solidity

Higher Ed
In this video, you will learn about how to write the Assembly language in Solidity and use it to optimize smart contracts.
<
br/>
This clip is from the chapter "Learn Advanced Solidity II" of the series "The Complete Solidity Course...
Instructional Video3:26
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Exercise - Use Assembly to Run Byte Conversions

Higher Ed
This is an exercise video on using Assembly to run byte conversions.
<
br/>
This clip is from the chapter "Learn Advanced Solidity II" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Instructional Video6:15
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - A Vulnerable Smart Contract

Higher Ed
In this video, we will discuss what a vulnerable smart contract is and how it can be exploited.
<
br/>
This clip is from the chapter "Solidity Patterns I - Cybersecurity" of the series "The Complete Solidity Course - Zero to...
Instructional Video3:19
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Solution - Bits and Bytes

Higher Ed
In this video, we will discuss the solution to the exercise on bits and bytes from the previous video.
<
br/>
This clip is from the chapter "Learn Solidity Basics IV (Conversions and Special Variables)" of the series "The Complete...
Instructional Video0:47
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Exercise - Bits and Bytes

Higher Ed
This is an exercise video on bits and bytes.
<
br/>
This clip is from the chapter "Learn Solidity Basics IV (Conversions and Special Variables)" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Instructional Video9:58
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Bits and Units - Conversion in Solidity

Higher Ed
In this video, you will learn about bits and units and how to convert them in Solidity.
<
br/>
This clip is from the chapter "Learn Solidity Basics IV (Conversions and Special Variables)" of the series "The Complete Solidity Course...
Instructional Video8:41
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Bytes Versus Strings in Solidity I

Higher Ed
In this video, you will learn about the difference between bytes and strings in Solidity.
<
br/>
This clip is from the chapter "Learn Solidity - Basics III" of the series "The Complete Solidity Course - Zero to Advanced for...
Instructional Video6:16
Curated Video

Fundamentals Of Object-Oriented Programming: Java and IntelliJ - Variables & Data Types

Higher Ed
In this lesson, we will learn about variables and look at the various datatypes available in Java. We will create a new Java project and understand the different data types.
Instructional Video7:11
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - RAM Features

Higher Ed
DRAM varies in other ways, such as single-sided or double-sided DRAM. Different motherboards may or may not be able to take advantage of these features.
<
br/>
This clip is from the chapter "Book Chapter 4 - RAM" of the series...
Instructional Video7:06
Curated Video

Deep Learning - Convolutional Neural Networks with TensorFlow - Large Datasets and Data Generators

Higher Ed
In this video, you will learn how to work with large image datasets in TensorFlow and Keras with data generators.
<
br/>
This clip is from the chapter "Transfer Learning for Computer Vision" of the series "Deep Learning -...
Instructional Video4:53
Curated Video

Kafka for Developers - Data Contracts Using Schema Registry - Data Contract and Serialization in Kafka

Higher Ed
In this video, we will investigate how serialization is connected to Kafka and how it benefits the overall Kafka architecture.
<
br/>
This clip is from the chapter "Data Contract and Serialization in Kafka" of the series "Kafka for...
Instructional Video14:45
Curated Video

What is BIG DATA? And introducing the 3 (or 5) V's

10th - Higher Ed
In this video, I want to answer the question, what is Big Data?
Instructional Video1:50
Curated Video

Java for Beginners with Hands-On Program and Capstone Project - Getting all information of a file like file size, etc.

Higher Ed
In this video, we will discover how to retrieve information about a file, such as its size, permissions, and other metadata. This video will explain how to use Java's file-handling APIs to access and retrieve file information, allowing...
Instructional Video7:02
Curated Video

Wireshark D4 V4 - IPv4 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 4: IPv4 deep-dive
Instructional Video3:40
Curated Video

Wireshark D3 V1 - How is traffic captured

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 1: How is traffic captured
Instructional Video4:44
Curated Video

Wireshark D2 V4 - View Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 4: View menu
Instructional Video9:36
Curated Video

Wireshark D4 V2 - TCP Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 2: TCP deep-dive
Instructional Video2:56
Curated Video

Wireshark D5 V6 - HTTP analysisARP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 6: ARP analysis
Instructional Video10:02
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - Constant Throughput Timer Importance

Higher Ed
This video explains the importance of the Constant Throughput Timer.
<
br/>
This clip is from the chapter "Timers in JMeter" of the series "Learn JMeter from Scratch on Live Applications - Performance Testing".This section explains...
Instructional Video8:50
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - Commands to Run Tests in Non-GUI Mode

Higher Ed
This video highlights the commands used to run tests in non-GUI mode.
<
br/>
This clip is from the chapter "JMeter Validations in Non-GUI Mode" of the series "Learn JMeter from Scratch on Live Applications - Performance...
Instructional Video3:15
Curated Video

Wireshark D4 V3 - UDP Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 3: UDP deep-dive