Packt
Consumer Offset Commit Strategies
This video explains how the Kafka consumer can commit offsets automatically. This clip is from the chapter "Kafka Elasticsearch Consumer and Advanced Configurations" of the series "Apache Kafka Series - Learn Apache Kafka for...
Independent Producers
Lessons from Broody Chickens
Chickens sometimes become broody. A broody chicken feels protective of its eggs, even if they are unfertilized and have no chance of hatching, and may act aggressively to intruders. Like chickens, humans often become fixated on and upset...
Good Words
A Generous Act
In this episode of the vocabulary-building podcast Good Words, listeners dig deeply into the meaning of the word magnanimous by hearing about how someone donated a kidney to his best friend. Listen to hear more about a quintessential...
Brian McLogan
How do we determine end behavior
π Learn how to determine the end behavior of the graph of a polynomial function. To do this we will first need to make sure we have the polynomial in standard form with descending powers. We will then identify the leading terms so that...
Science360
Fascinating Flight
Biologist Ken Dial has documented in extraordinary detail how birds are put together and the mechanics of how they take to the air. With support from the National Science Foundation, Dial and his team at the University of Montana Flight...
TLDR News
Biden & Putin: The Wins and Losses Out of the Geneva Summit - TLDR News
Yesterday US president Joe Biden met with Russian President Vladimir Putin. This was the last call on Biden's broadly successful European tour but did this stop meet expectations? What did the two world leaders discuss let alone agree to?
But Why
The Science of Tickling
Does tickling have a purpose? Why are certain parts of the human body especially sensitive to tickling? Scientists believe the tickling response evolved in early humans to help them protect themselves from predators and insects. Tickling...
Brian McLogan
Evaluate the limit to infinity from a graph with jump discontinuity
π Learn how to evaluate the limit of a function from the graph of the function. The limit of a function as the input variable of the function tends to a number/value is the number/value which the function approaches at that time. When...
The Business Professor
Hawthorne Experiments
Dr. Kyle Huff explains what are the Hawthorne Experiments
XKA Digital
Whatever the circumstances, do the right thing
Sue Porto has been CEO of St John's Hospital Bath, since May 2015. Prior to this she had been at the national charity Beanstalk, serving as its Chief Executive Officer, since October 2010, leading the charity's work in tackling potential...
IDG TECHtalk
Why Go binaries are so large (and what you can do about it) | Smart Go
Why are Go program binaries so large, compared to similar programs written in other languages like C or C++? In this video we'll go into the details of why Go binaries are the sizes they are, and what you can do about it -- that is, if...
Englishing
Verb have - 6 ways to use the verb HAVE
In this lesson, Mr. P./Marc explains seven different ways you could use the verb have. Some of them being; have/has got to - have/has better, using have as a full verb, modal auxiliary and auxiliary. He provides simple examples to...
Brian McLogan
Learn how to identify the end behavior
π Learn how to determine the end behavior of the graph of a polynomial function. To do this we will first need to make sure we have the polynomial in standard form with descending powers. We will then identify the leading terms so that...
Brian McLogan
End behavior of polynomials factored out
π Learn how to determine the end behavior of the graph of a factored polynomial function. To do this we will first need to make sure we have a polynomial in standard form (i.e. we will expand all factored terms) with descending powers....
Brian McLogan
How to determine the end behavior of a polynomial
π Learn how to determine the end behavior of the graph of a polynomial function. To do this we will first need to make sure we have the polynomial in standard form with descending powers. We will then identify the leading terms so that...
The Wall Street Journal
How to Measure the Role of Cybersecurity Awareness
Highmark Health CISO, Omar Khawaja, discusses how businesses can establish the value their human risk mitigation program brings.
Australian Broadcasting Corporation
Internet Trolling
Mikki vs the World is a creative, funny, and factual series designed to help teens get a grip on whatβs happening inside their heads. When Dr. M posts another mean comment on her little sister's feed, she begins to wonder: is she...
Brian McLogan
Evaluate the limit of a graph with asymptotes
π Learn how to evaluate the limit of a function from the graph of the function. The limit of a function as the input variable of the function tends to a number/value is the number/value which the function approaches at that time. When...
Curated Video
Complete Modern C++ - Inheritance and Composition
In this video, we revisit inheritance and composition and explain it again with examples. This clip is from the chapter "Object-Oriented Programming" of the series "Complete Modern C++".In this section, you will learn about inheritance...
Brian McLogan
Determine end behavior of a polynomial
π Learn how to determine the end behavior of the graph of a polynomial function. To do this we will first need to make sure we have the polynomial in standard form with descending powers. We will then identify the leading terms so that...
Brian McLogan
Classifying polynomials and then determining the end behavior
π Learn how to determine the end behavior of the graph of a polynomial function. To do this we will first need to make sure we have the polynomial in standard form with descending powers. We will then identify the leading terms so that...
Brian McLogan
Define Inc,dec,cont, intervals even,odd, functions and end behavior
Define Inc,dec,cont, intervals even,odd, functions and end behavior
Global Ethics Solutions
Respect and Fair Treatment: Understanding Sexual Harassment
Sexual-harassment is the most common form of harassment in the workplace. This course helps participants understand the nature and characteristics of sexual harassment. It covers Quid Pro Quo and Hostile Work Environment forms of...