Instructional Video11:26
Crash Course

The Internet: Crash Course Computer Science

12th - Higher Ed
Today, we're going to talk about how the Internet works. Specifically, how that stream of characters you punch into your browser's address bar, like "youtube.com", return this very website. Just to clarify we're talking in a broader...
Instructional Video12:21
Crash Course

Graphical User Interfaces: Crash Course Computer Science

12th - Higher Ed
Today, we're going to discuss the critical role graphical user interfaces, or GUIs played in the adoption of computers. Before the mid 1980's the most common way people could interact with their devices was through command line...
Instructional Video3:37
Packt

Evaluate the scalability and reliability of networks : Application types and network performance

Higher Ed
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc. Introduction to Computer Networks (ICND1): Application types and...
Instructional Video15:55
Zach Star

The Applications of Algorithms

12th - Higher Ed
A huge part of computer science is learning about algorithms and how to apply them. Algorithms can be very simple and very complex and in this video I outline some algorithms with practical applications that you can even apply to your life.
Instructional Video9:21
Curated Video

Python In Practice - 15 Projects to Master Python - Working with Images: Computer Vision

Higher Ed
This video explains working with images with the help of Computer Vision. This clip is from the chapter "Artificial Intelligence" of the series "Python in Practice - 15 Projects to Master Python".This section focuses on Artificial...
Instructional Video6:16
Packt

List computer networking media : Firewalls and Servers

Higher Ed
From the section: The Internet. Here, we explore our internet options. In this episode, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the episode...
Instructional Video2:09
Financial Times

Why Israel leads the world in computer vision

Higher Ed
This technology's impact Is being felt in fields from medicine to self-driving cars and even shopping. Israel's start-ups in this sector have attracted millions of dollars in investment. It has a big advantage: a heavy concentration of...
Instructional Video10:53
Curated Video

Describe the applications of artificial intelligence systems : What is Machine Learning?

Higher Ed
From the section: An Introduction to Machine Learning. In this section, we are introduced to Machine Learning. We learn about its types and applications. There will an explanation on AI versus ML. An Introduction to Machine Learning:...
Instructional Video25:46
Curated Video

Describe the applications of artificial intelligence systems : Types and Applications of ML

Higher Ed
From the section: An Introduction to Machine Learning. In this section, we are introduced to Machine Learning. We learn about its types and applications. There will an explanation on AI versus ML. An Introduction to Machine Learning:...
Instructional Video3:30
Curated Video

Data Science Model Deployments and Cloud Computing on GCP - How Applications Run

Higher Ed
This video explains how applications run in runtime environments. This clip is from the chapter "Cloud Platforms" of the series "Web Development Concepts for Everyone".This video explains cloud platforms and cloud hosting with Heroku.
Instructional Video3:28
Packt

Compare the breadth-first and depth-first search algorithms : Introduction to File Search Application

Higher Ed
From the section: Shortest Time Search (Depth First Search). Understand the application that we will develop in this section by answering the questions. • What is search • What is file search • How does it work Understand the application...
Instructional Video4:37
Curated Video

Describe cyber attacks that could affect a computer system or network : Leaving a Backdoor in the Target Machine

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will find out what is persistent...
Instructional Video2:52
Curated Video

World of Computer Networking Your CCNA start - Client and Server

Higher Ed
This video explains the client and server in the transport layer. This clip is from the chapter "Transport Layers: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)" of the series "World of Computer Networking: Your...
Instructional Video4:40
Curated Video

Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application

Higher Ed
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...
Instructional Video21:00
Zach Star

The History of Mathematics and Its Applications

12th - Higher Ed
The History of Mathematics and Its Applications
Instructional Video8:03
Curated Video

The Art of Doing - Python Network Applications with Sockets - Advanced GUI Chat Room Part 11 - Final Testing

Higher Ed
In this eleventh part, we are going to work on the final test. This clip is from the chapter "Creating an Advanced GUI Chat Room with the Json Module" of the series "The Art of Doing - Python Network Applications with Sockets".In this...
Instructional Video9:43
Curated Video

Describe the applications of artificial intelligence systems : AI vs ML

Higher Ed
From the section: An Introduction to Machine Learning. In this section, we are introduced to Machine Learning. We learn about its types and applications. There will an explanation on AI versus ML. An Introduction to Machine Learning: AI...
Instructional Video10:09
Zach Star

Computer Engineering Careers and Subfields

12th - Higher Ed
This video covers various subfields of computer engineering and what careers you can get in those fields. Computer engineering is basically the combination of electrical engineering and computer science, which means a lot of these jobs...
Instructional Video0:58
Curated Video

Describe the applications of artificial intelligence systems : Introduction

Higher Ed
From the section: An Introduction to Machine Learning. In this section, we are introduced to Machine Learning. We learn about its types and applications. There will an explanation on AI versus ML. An Introduction to Machine Learning:...
Instructional Video17:05
Curated Video

Describe the applications of artificial intelligence systems : Essential Math for ML and AI

Higher Ed
From the section: An Introduction to Machine Learning. In this section, we are introduced to Machine Learning. We learn about its types and applications. There will an explanation on AI versus ML. An Introduction to Machine Learning:...
Instructional Video12:32
Packt

Introduction to computer hardware and software : Introduction to Mass Storage

Higher Ed
From the section: Mass Storage Technologies. In this section, we cover topics related to Mass storage. Mass Storage (disk drives and solid-state drives) store the operating system and applications. Despite the different technologies,...
Instructional Video7:43
Packt

List computer networking media : E-Mail

Higher Ed
From the section: The Internet. Here, we explore our internet options. Continuing with the Application-layer protocols, this episode explores e-mail. Mike covers the three classic e-mail protocols, SMTP for sending and POP3 and IMAP4 for...
Instructional Video9:05
Curated Video

Describe the different types of malware that could affect a computer system or network : Ransomware

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video3:00
Curated Video

The Development and Importance of the Computer Mouse

Pre-K - Higher Ed
The computer mouse has become an essential computer accessory, making digital navigation easier from gaming to office work. Learn how do messages are transmitted from the mouse to the computer and how the technology has evolved since the...

Other popular searches