Instructional Video9:17
Curated Video

Avoid Project Failure: 5 Top Tips

10th - Higher Ed
No one wants their project to fail. Despite this, project failure is all too common. When you start projects, you are often filled with optimism, and can barely recognize the possibility of failure. And the risk of project failure gets...
Instructional Video9:36
Curated Video

History of Disneyland

K - 5th
Learn about Walt Disney's dream to build a theme park and the hard work, determination and creativity it took to make that dream come true.
Instructional Video4:52
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Transfer Versus Send Method in Solidity

Higher Ed
This video discusses the differences between the “transfer†and “send†methods in Solidity, which are used to transfer Ether between accounts. The video covers the potential risks of using the “send†method, which can result in...
Instructional Video6:37
Curated Video

Data Science Model Deployments and Cloud Computing on GCP - Scalability - Horizontal Versus Vertical Scaling

Higher Ed
This video discusses scalability in the context of horizontal versus vertical scaling, exploring the advantages and disadvantages of each method, and providing insights into when to choose one over the other. This clip is from the...
Instructional Video4:32
Curated Video

Chatbots Development with Amazon Lex - Visual Builder

Higher Ed
In this video, we will create a conversational flow, plan the utterances, and make the chatbot accept the queries and responses. We will then use the visual builder to set up the visual perspective of the chatbot.
Instructional Video11:09
Curated Video

Fundamentals of Secure Software - Threat Actors and More Definitions

Higher Ed
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Instructional Video9:46
Curated Video

Fundamentals of Secure Software - Application Security Goals

Higher Ed
In this video, we will continue defining terms and start talking about security goals.
Instructional Video6:49
Curated Video

Fundamentals of Secure Software - Application Security Terms and Definitions

Higher Ed
In this video, we will cover the initial terms and definitions related to application security.
Instructional Video3:18
Curated Video

Linux PAM Security Administration - PAM Configuration File - Control Flags

Higher Ed
This video explains the second column of the configuration file, which is the control flags.
Instructional Video11:30
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Notification Fetch

Higher Ed
In this video, we will be discussing how to fetch notifications for a user in our Twitter Clone app's backend.
Instructional Video17:34
Curated Video

SwiftUI and Node.js Full Stack - Build Twitter - iOS 16 - Fetch User Function

Higher Ed
This video focuses on the "Fetch User" function, which is a crucial part of any app that requires user authentication. In this video, you will learn how to retrieve user data from our backend database and use it in our application. We...
Instructional Video7:19
Healthcare Triage

Zoloft, Mounjaro, and Social Stigma

Higher Ed
Drugs that do a pretty good job of easing symptoms of depression and drugs that really help people struggling with obesity have a couple things in common. The first is that we have almost no idea how they work, and the second is that...
Instructional Video8:37
Curated Video

Kafka for Developers - Data Contracts Using Schema Registry - Build Kafka Producer to Publish the CoffeeOrder Events

Higher Ed
In this video, we will build the producer that will be used to publish the Kafka AVRO records into the Kafka topic. This clip is from the chapter "Build a Coffee Order Service Using Spring Boot and Schema Registry" of the series "Kafka...
Instructional Video3:06
Curated Video

CISSP Crash Course - Resource Protection

Higher Ed
This video explains media management and protection. This clip is from the chapter "Security Operations" of the series "CISSP Crash Course".This section covers domain 7, which focuses on security operations.
Instructional Video7:17
Curated Video

CISSP Crash Course - Engineering Processes and Secure Design

Higher Ed
This video explains engineering processes and secure design. This clip is from the chapter "Architecture and Engineering" of the series "CISSP Crash Course".This section covers domain 3, which focuses on architecture and engineering.
Instructional Video4:33
Curated Video

Chatbots for Beginners: A Complete Guide to Build Chatbots - Chatbot Development with AWS Lex and AWS Lambda: Visual Builder

Higher Ed
In this video, we will create a conversational flow, plan the utterances, and make the chatbot accept the queries and responses. We will then use the visual builder to set up the visual perspective of the chatbot. This clip is from the...
Instructional Video3:21
Curated Video

Oracle Database Administration from Zero to Hero - Practice - Using Data Recovery Advisor

Higher Ed
In this practice video, you will gain hands-on experience in using the Data Recovery Advisor. You will learn how to utilize the advisor to detect and repair the loss of data files, ensuring the integrity and recoverability of your...
Instructional Video12:06
Curated Video

Oracle Database Administration from Zero to Hero - Using Data Recovery Advisor (Part 2 of 2)

Higher Ed
In this video, we will dive deeper into the practical usage of the Data Recovery Advisor. You will learn how to utilize the Data Recovery Advisor to list data failures, check for corruption in datafiles, obtain recommendations for...
Instructional Video7:15
Curated Video

Oracle Database Administration from Zero to Hero - Using Data Recovery Advisor (Part 1 of 2)

Higher Ed
In this video, we will introduce the Data Recovery Advisor and its role in the backup and recovery lifecycle. You will learn about the various stages of the Data Recovery Advisor and its significance in detecting and resolving data...
Instructional Video13:08
Curated Video

Oracle Database Administration from Zero to Hero - Introducing RESTORE and RECOVER Commands

Higher Ed
In this video, we will introduce the RESTORE and RECOVER commands in Oracle databases. You will learn about the difference between non-critical and critical data loss, understand the actions performed by these commands, and explore the...
Instructional Video12:40
Curated Video

Oracle Database Administration from Zero to Hero - Introducing Backup and Recovery

Higher Ed
In this video, we will explore the fundamentals of backup and recovery in Oracle databases. You will learn about different categories of data failure, understand the backup and recovery roadmap, and compare the available Oracle database...
Instructional Video2:37
Curated Video

Design Microservices Architecture with Patterns and Principles - Adapt: Microservices Architecture with Database Sharding Pattern - Cassandra

Higher Ed
The video demonstrates how to adapt an existing microservices architecture with the database sharding pattern using Cassandra as the underlying database technology, the process of integrating Cassandra into the microservices ecosystem...
Instructional Video2:42
Curated Video

Design Microservices Architecture with Patterns and Principles - Cassandra NoSQL Database - Peer-to-Peer Distributed Wide Column Database

Higher Ed
The video introduces Cassandra, a popular NoSQL database known for its ability to handle massive amounts of data across distributed clusters, the features of Cassandra, peer-to-peer architecture and wide column data model, a suitable...
Instructional Video2:03
Curated Video

Design Microservices Architecture with Patterns and Principles - Evaluate: Microservices Architecture with Fan-Out Publish/Subscribe Messaging

Higher Ed
This video focuses on the evaluation of a microservices architecture that utilizes the fan-out publish/subscribe messaging pattern. It examines the performance, scalability, and maintainability aspects of the architecture and discusses...