Hi, what do you want to do?
Curated Video
Complete Python Scripting for Automation - Functions with variable keyword arguments
Functions: Functions with variable keyword arguments
r/>
This clip is from the chapter "Functions" of the series "Complete Python Scripting for Automation".You will learn how to define a Function, converting simple code into...
r/>
This clip is from the chapter "Functions" of the series "Complete Python Scripting for Automation".You will learn how to define a Function, converting simple code into...
Music Matters
What is Pandiatonicism in Music? - Music Theory
What does pandiatonicism mean in music? How did pandiatonicism come about and which composers used it? This music theory lesson explains pandiatonicism, ‘pan’ meaning ‘all’ and ‘diatonic’ meaning inside a key. Examples are explored which...
Packt
Log Compaction Practice
This video explains how to allow log compaction into practice.
<
br/>
This clip is from the chapter "Advanced Topics Configurations" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will...
<
br/>
This clip is from the chapter "Advanced Topics Configurations" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will...
APMonitor
Python 🐍 Dictionaries
Dictionaries are a list with key and value pairs. The format for this method of storing values is curly brackets {} as seen below. After you assign a dictionary a name, you can enter values by putting a value followed by a colon to...
Curated Video
Core Java Programming Course- Iterating on Maps
This video explains how to iterate on maps.
r/>
This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps...
r/>
This clip is from the chapter "Sets and Maps" of the series "Learn How to Code: The Complete Core Java Programming Course".This section explains the various sets and maps...
Curated Video
Complete Python Scripting for Automation - for loop to work with strings, list, tuple and dictionaries
Loops - for and while loops with break, continue and pass: for loop to work with strings, list, tuple and dictionaries
r/>
This clip is from the chapter "Loops - for and while loops with break, continue and pass" of the series...
r/>
This clip is from the chapter "Loops - for and while loops with break, continue and pass" of the series...
Brainwaves Video Anthology
James E. Ryan - Five Essential Questions
James E. Ryan is the 11th dean of the Harvard Graduate School of Education. A leading expert on law and education, Ryan has written extensively about the ways in which law structures educational opportunity. His articles and essays...
Curated Video
Microsoft SQL Server Development for Everyone - Creating a Relationship in SQL Server
This video explains how to create a relationship in SQL Server.
r/>
This clip is from the chapter "Relationships and Foreign Keys" of the series "Microsoft SQL Server Development for Everyone".This section presents an...
r/>
This clip is from the chapter "Relationships and Foreign Keys" of the series "Microsoft SQL Server Development for Everyone".This section presents an...
Institute for New Economic Thinking
John Mauldin - The Long Game for Developed Country Debt 3/5
In Part 3 of this five-part INET "From the Director's Chair" interview, INET Executive Director Robert Johnson talks with John Mauldin about the long-term debt problems in developed countries. Mauldin says that contrary to recent...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - SSH Public Key Authentication Lab
Multifactor authentication should always be used for administrative accounts. In this demo, SSH public key authentication is configured for a Linux host.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA...
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA...
National Parks Service
Everglades National Park - Episode 263
Promoting Responsible Recreation: Eco-Mariner, Blue Star & DolphinSMART
Curated Video
Understanding Independence and Probability
In this video, the teacher explains the concept of independence in probability using examples from scary movies and selecting keys. The teacher demonstrates how the outcomes of the first attempt can influence the likelihood of the second...
Packt
Java Producer with Keys
This video explains how to create Kafka producer in Java using keys.
<
br/>
This clip is from the chapter "Kafka Java Programming 101" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will...
<
br/>
This clip is from the chapter "Kafka Java Programming 101" of the series "Apache Kafka Series - Learn Apache Kafka for Beginners".In this section, you will...
XKA Digital
Keeping your head in stressful situations
Ben looks after the enterprise risk management strategy, culture, and process across BT's group functions, and also helps the company manage pan-business enterprise risks in the major non-UK regions in which BT operates (spanning over...
Packt
Setting up SSH Keys
Application Deployment (Weather App): Setting up SSH Keys
<
br/>
This clip is from the chapter "Application Deployment (Weather App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will...
<
br/>
This clip is from the chapter "Application Deployment (Weather App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will...
Curated Video
IELTS Energy Podcast 1075: How Cynthia Overcame IELTS for an Overall 8
IELTS Energy Podcast 1075: How Cynthia Overcame IELTS for an Overall 8
Learning Mole
Pop Fox Theatre - Using Costumes
Follow Rosie, Xixi and Haha as we explore different costumes for different characters.
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Physical security part 2
CISSP Domain 3: System Architecture and Engineering: Physical security part 2.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Attacks on our cryptography
CISSP Domain 3: System Architecture and Engineering: Attacks on our cryptography.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Science360
NSF Science Now: Episode 19
In this week's episode we learn how our smart phone can be used to check our cholesterol and that great white sharks actually live longer than previously thought! Check it out!
Packt
Practical Exercise Explaining Page Object Model
This video presents a practical exercise explaining the page object model.
<
br/>
This clip is from the chapter "Framework Part 8 - Page Object Pattern and Page Factory" of the series "Selenium WebDriver with Java - Basics to...
<
br/>
This clip is from the chapter "Framework Part 8 - Page Object Pattern and Page Factory" of the series "Selenium WebDriver with Java - Basics to...
IDG TECHtalk
Apple updates and the company's push toward 5G | TECH(talk)
It's already been a big summer for Apple. At the annual WWDC conference in June, the company unveiled the long-awaited Mac Pro, along with a myriad of software updates. But recent news that Apple may buy Intel's smartphone modem business...
IDG TECHtalk
Python 3.9: What's new in the latest version of Python
The latest version of Python offers new conveniences for the developer: new ways to merge dictionaries, new string-handling functions, and more convenient type-hinting features.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Cryptographic Attacks
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...
r/>
This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total...