Instructional Video11:47
Packt

Advanced Computer Vision Projects 2.4: Finding and Reading License Plates

Higher Ed
In this video, we identify which characters do in fact belong to plates and convert them to text. • Figure out what locations are actually plates • Use k-nearest neighbors to convert images to text • View and analyze the results
Instructional Video6:15
Curated Video

High Performance Scientific Computing with C 2.4: Compiler Optimizations

Higher Ed
How can we use the compiler to automatically speed up our programs? • Learn about the basic -O optimizations • See how -Ofast-math can squeak out even better optimizations • See why -Ofast-math isn’t enabled by default
Instructional Video4:56
Curated Video

Learning D3.JS 5.0 7.6: Visualization with Scales

Higher Ed
In this video, we will learn how to use the scale, range, and domain functions in the scatter plot to dynamically present data. • Create the variables for x and y coordinates • Alternate the returning values of circles and labels • View...
Instructional Video8:46
Curated Video

Bug Bounty Program Certification 11.2: Download Reverse Engineering Tools

Higher Ed
This video focuses on the tools to perform reverse engineering tools. • Explore reverse engineering tools listing • Download dex2jar tool • Download JD-gui tool
Instructional Video5:33
Curated Video

Bug Bounty Program Certification 4.2: Setup External Network Attack

Higher Ed
In this video, we will see how to setup external wireless adapter and wireless attack. • Explore information about external wireless adapter • Connect wireless adapter to Kali Linux OS • Setup wireless attack lab
Instructional Video6:55
Curated Video

Cloud Native Development on Azure with Java 4.1: Create a Jenkins Master in Azure Using an Ubuntu Virtual Machine

Higher Ed
We will create a Jenkins master and deploy it on Azure using a new Azure virtual machine. • Deploy a new virtual machine and set up the Jenkins master server • Look for a ready-made instance with Jenkins installed and configured • Track...
Instructional Video3:30
Curated Video

Cloud Native Development on Azure with Java 2.2: Deploy a New Cosmos DB in Azure

Higher Ed
Now it’s time to take a step ahead with the TODO list we created in the previous video! We are going to connect our Java application to use Azure Cosmos DB as a backend for storing the TODO list data items. • Create a new Cosmos DB...
Instructional Video3:06
Curated Video

Learning D3.JS 5.0 3.3: Creating Texts

Higher Ed
In this video, we will learn how to create texts. • Create the text element and add some CSS properties • Create a text area • Make the text clickable
Instructional Video10:59
Programming Electronics Academy

Introduction to Interrupts: Arduino Course 9.1

Higher Ed
An introduction to interrupts in programming.
Instructional Video7:16
Programming Electronics Academy

Download IDE MAC OSX: Arduino Course 2.4

Higher Ed
A walk through of downloading and installing the Arduino IDE (Integrated Development Environment) for Mac OS X computers
Instructional Video18:43
Let's Tute

How to Paint a Realistic Monster Leaf on Canvas

9th - Higher Ed
In this video, the teacher demonstrates how to create a realistic and vibrant monster leaf painting on canvas. They guide viewers through the process of sketching, coloring, and adding details to bring the leaf to life. The final result...
Instructional Video18:50
Weatherthings

Kilauea 2018: Hawaii's Most Active Volcano

6th - 8th
Kilauea is an active volcano in Hawaii that erupts every 10 to 20 years. In 2018, Kilauea eruptions on a rift zone destroyed more than 700 hundred homes, forced evacuations, and sent lava downhill to cover 14 square miles of land in...
Instructional Video2:53
Curated Video

Ensemble Machine Learning Techniques 6.3: Example on Kaggle Competition

Higher Ed
We will get comfortable with using ensemble learning for competitive data science. • We will understand the dataset • We will create and train different models • We will combine the trained models using stacking and get our final result
Instructional Video10:09
Curated Video

Python for Network Forensics 3.3: Deeper File Properties

Higher Ed
In this video, we will explore other important properties of file that will allow you to decipher a known bad or malicious actor. • Learn how a digest algorithm works with a file • Develop a Python application to hash a file • Alter our...
Instructional Video9:18
Curated Video

Mastering Tableau 2018.1, Second Edition 4.2: Data Blending with Tableau

Higher Ed
Merge different data sources with the help of data blending. • Understand how data blending works • Blend data in Tableau
Instructional Video7:20
Curated Video

Serverless JavaScript Projects 4.1: Creating the UI by Building a Good Front End with Drag and Drop Tiles

Higher Ed
This video covers a usable front end UI that works for people to visualize a SCRUM or KANBAN board. • Set up an HTML template with Bootstrap and jQuery • Link the jQuery UI Library for drag and drop functionality • Build a UI that has...
Instructional Video9:14
Curated Video

High Performance Scientific Computing with C 3.3: Vectorizing with AVX

Higher Ed
How can we use automatic vectorization to speed up our code? What vectorization options currently exist? • Learn about the history of vector instructions • Learn how to compile with AVX/AVX2 • Learn about the latest AVX-512 instruction set
Instructional Video6:36
Curated Video

Tips, Tricks, and Techniques for Node.js Development 5.1: Process Environment Variables

Higher Ed
In this video, we will learn why and how we can use environment variables, as well as how to manage these variables. • Show how environment variables work • Load variables from .env files • Show node-env-run
Instructional Video3:19
Curated Video

Learning D3.JS 5.0 5.2: Function in Methods

Higher Ed
In this video, we will learn to add functions to methods to make them more dynamic. • Add a function in the text method • Create the style method • Add a function and an if-else statement in the style method
Instructional Video10:50
Curated Video

Bug Bounty Program Certification 9.4: Forge Request Attack on Websites

Higher Ed
In this video, you will perform cross site request forgery attack on website. • Setup Lab setup using Mutillidae Buggy web application for forgery attack • Learn from the example of Force someone to add a blog without consent • Learn...
Instructional Video6:36
Curated Video

Bug Bounty Program Certification 4.1: Bugs Overview in Networks As External Attacker

Higher Ed
In this video, we will find bugs in networks as external attacker. • Explore wireless attack process as an attacker • Learn about pre-attack phase of external attack • Learn about post attack phase of external attack
Instructional Video12:57
Curated Video

Cloud Native Development on Azure with Java 5.2: Deploying Multi-Container Application to Azure Kubernetes Service

Higher Ed
Now that you know what Kubernetes is, we are all ready to get our hands dirty! In this video, we will deploy a multi-container application to Azure Kubernetes Service. • Configure an existing service principle and use it to manage the...
Instructional Video13:55
Programming Electronics Academy

Details of Using Arduino Libraries: Arduino Course 6.4

Higher Ed
A walk through of using a code library with Arduino.
Instructional Video1:01
Curated Video

I WONDER - How Does A Compass Work?

Pre-K - 5th
This video is answering the question of how does a compass work.