Packt
Introduction to computer hardware and software : CPU Sockets
From the section: CPUs. In this section, we explore features about CPU. Both AMD and Intel use unique CPU packages that install into their respective sockets. It’s imperative for a tech to know the most popular sockets available today...
Curated Video
Use variables to store data : Variables in Python
From the section: A Full Python Refresher. This section is about Python Refresher and includes lectures on Variables in Python, Methods, List, tuple and sets. A Full Python Refresher: Variables in Python
Packt
Compare the breadth-first and depth-first search algorithms : BFS and DFS Intro
From the section: BFS and DFS Grid World. This section will cover BFS and DFS Grid concept. BFS and DFS Grid World: BFS and DFS Intro
Curated Video
Modify a data structure : Testing Add To Tail and Add To Head
From the section: Linked Lists. This section introduces Linked Lists and "Node" constructor functions along with Big O Notation and calculating the runtime of a function Linked Lists: Testing Add To Tail and Add To Head
Curated Video
Fix the errors in a computer program or algorithm : Catching Exceptions
From the section: Advanced Python. This section helps to understand about OOP, classes, class interface etc. We will dive into learning Advance Python When you get an error, you need to "handle" it so your code doesn't crash.
Curated Video
Describe an advanced data structure : Find the Given-Length Subarray with the Maximum Minimum
From the section: Doing a Lot with Very Little. In this section, we will explore some problems that look difficult to solve efficiently at first sight. You might think that they require some advanced logic or data structures, but in fact...
Curated Video
Develop a computer program to solve a problem using control structures : While Loops
From the section: Python Crash Course. In this section, the author covers Python and provides a crash course on this. Python Crash Course: While Loops
Packt
Introduction to computer hardware and software : Keyboards and Mice
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. Our hands are constantly on our keyboards and mice, yet they are often some of the most...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Classifying Images with a Simple CNN, Part 1
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: [Activity] Classifying Images with a Simple CNN, Part 1
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Code to Train a perceptron for binary classification
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Code to Train a perceptron for binary classification
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Project #1: Canny Sobel and Laplace Edge Detection using Webcam
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: [Activity] Project #1: Canny Sobel and Laplace Edge Detection using Webcam
Curated Video
Learning R for Data Visualization (Video 25)
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
Curated Video
Learning R for Data Visualization (Video 21)
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
Curated Video
Python for Network Forensics 2.1: Enumerating Directories
In this video, we will develop the technique to scan files in a directory in or to obtain items and properties. • Understand the basis of recursion and how it applies to directories • Learn about the OS module and how it applies to...
Curated Video
Python for Network Forensics 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Mastering Tableau 2018.1, Second Edition 11.2: Formatting Data with Different Formatting Techniques
In this video, we’ll see how to format data using different formatting techniques. • Steps to create an effective story • Implement formatting on data
Curated Video
Tips, Tricks, and Techniques for Node.js Development 3.4: Generators and Yield
In this video, we will learn the use of generators and yields. • Get an introduction to generators • Use a generator function with yield keyword • Run this generator function
Curated Video
Learning D3.JS 5.0 6.3: Reverse the Bar
In this video, we will continue with the optimization and also reverse the bar chart. • Add variables • Optimize the code • Revert the bar chart
Curated Video
Learning D3.JS 5.0 4.6: The classed() and style() Methods
We will learn how to add more than one class to an element. • Learn how to remove the attr() method and add the classed() method • Understand the example using the developer tools • Use the in-style method: style()
Curated Video
Bug Bounty Program Certification 4.4: Exploit Wireless Network and Become Internal User
This video will help you exploit WPA wireless. • Understand the use of Fern Wi-fi Cracker • Lab setup to learn exploitation • Exploit WPA/WPA2 using Kali Linux
APMonitor
Install Python 3.7 on Windows or Linux
Follow these steps to install Python 3.7 on Windows: 1. Remove old Python distributions 2. Browse to python.org and download installer 3. Install to C:\Python37 4. Add to PATH Environment Variable a. C:\Python37 b. C:\Python37\Scripts 5....
Programming Electronics Academy
Change the LED Variable: Arduino Course 4.4
Adjusting pin numbers in Arduino sketches and the outcomes.
Science360
Composite Nanocoatings
Adam Steel, the entrepreneurial lead of Composite Nanocoatings, discusses his company's development of ultra-low-friction surfaces.
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Black-Box Adversarial with Example
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...