Curated Video
Invoking The 25th Amendment
What happens when the President is no longer able to perform their duties? That’s when the 25th Amendment to the US Constitution comes into play.
Science360
What is synthetic biology?
What is synthetic biology? Catherine Royer, professor of biology at Rensselaer Polytechnic Institute, answers the question on this edition of "Ask a Scientist."
The Business Professor
Third-Party Beneficiaries to a Contract
This Video Explains Third-Party Beneficiaries to a Contract
Curated Video
Creational Design Patterns in Modern C++ - SQL Server Database Classes
This video demonstrates how to add the SQL server database classes and explains their usage. This clip is from the chapter "Abstract Factory" of the series "Creational Design Patterns in Modern C++".This section focuses on the basic...
Curated Video
Complete Modern C++ - Filesystem - path
This video introduces filesystem library components. This clip is from the chapter "C++17 Standard Library Components" of the series "Complete Modern C++".null
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Introducing a Lint-Staged Package to Check only Staged Files
This video demonstrates how to use a lint-staged package to check only staged files. This clip is from the chapter "GitHub Hooks" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains GitHub hooks...
Curated Video
The Complete Practical Docker Guide - Why Do We Need Mongo and mongo-express Services
This video explains why do we need Mongo and mongo-express services. This clip is from the chapter "Launching Multiple Services Using Docker Compose" of the series "The Complete Practical Docker Guide".This section focuses on launching...
Curated Video
The Complete Practical Docker Guide - Inserting Documents into Elasticsearch Index
This video explains how to insert documents into Elasticsearch index. This clip is from the chapter "Additional Containers – Elasticsearch, Redis, Httpd" of the series "The Complete Practical Docker Guide".This section focuses on...
Curated Video
World of Computer Networking Your CCNA start - Number of Hosts Needed in a Network - Example 3
This video wraps up your learning of number of hosts needed in a network with an example. This clip is from the chapter "Networks Masks and Subnetting" of the series "World of Computer Networking: Your CCNA start".This section introduces...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - While Loop
In this video, you'll learn about the while loop in Python. This clip is from the chapter "Python Basics" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn the basics of Python.
Curated Video
PySpark and AWS: Master Big Data with PySpark and AWS - Solution (Cache and Persist)
In this video, you will learn about the concepts of cache and persist. This clip is from the chapter "Spark DFs" of the series "PySpark and AWS: Master Big Data with PySpark and AWS".This section focuses on Spark DataFrames in depth.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Wireless Attacks Fundamentals
In this video, you'll learn the fundamentals of wireless attacks and how they're done. This clip is from the chapter "Wireless Penetration Testing" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this...
Curated Video
I WONDER - What Job Does The Liver Do?
This video is answering the question of what job does the liver do.
Curated Video
Building Muscle Memory: The Key to Mastering Skills
In this video, we explore the concept of muscle memory and how it can be consciously built. We learn about the theories of motor learning and the importance of practice and repetition in developing superior performance. The video also...
Curated Video
Data Science and Machine Learning (Theory and Projects) A to Z - Introduction to Machine Learning: Reinforcement Learning
In this video, we will cover reinforcement learning. This clip is from the chapter "Deep learning: Artificial Neural Networks with Python" of the series "Data Science and Machine Learning (Theory and Projects) A to Z".In this section, we...
Brian McLogan
Verifying identities using two different variables
👉 Learn how to verify trigonometric identities having rational expressions. To verify trigonometric expression means to verify that the term(s) on the left hand side of the equality sign is equal to the term(s) on the right hand side. To...
Curated Video
Complete Modern C++ - Strings - Part II (std::string)
This video introduces the std::string class from the standard library and its usage. • Look at the Qt documentation • Override mouse event functions • Print data to the console to confirm that the app is reacting properly This clip is...
Curated Video
Complete Modern C++ - std::variant - III
In this video, you will learn how to use the visitor to read or modify active members in a variant. This clip is from the chapter "C++17 Standard Library Components" of the series "Complete Modern C++".null
Curated Video
The Complete Practical Docker Guide - Challenge: Redis and Redis-Commander
This is a challenge video that gives the problem statement for Redis and Redis-Commander. This clip is from the chapter "Additional Containers – Elasticsearch, Redis, Httpd" of the series "The Complete Practical Docker Guide".This...
Curated Video
The Modern JavaScript Bootcamp (2019) - Moment
Does JavaScript come with built-in support for dates? Yup. Is it fun to use? Nope. In this video, you’ll learn about moment.js, a third-party JavaScript library that makes working with dates better. This clip is from the chapter "Data...
Curated Video
World of Computer Networking Your CCNA start - Routers
This video explains the concept of routers. This clip is from the chapter "Routers and Network Layer" of the series "World of Computer Networking: Your CCNA start".This section introduces you to routers and the network layer.
Curated Video
World of Computer Networking Your CCNA start - Binary AND and OR Operators
This video introduces you to binary AND and OR operators. This clip is from the chapter "Binary Math" of the series "World of Computer Networking: Your CCNA start".This section introduces you to binary math.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Adding Available Options
In this video, you'll learn to add available options to your attack. This clip is from the chapter "Developing a Brute Force Attacker" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - If Else Statement
This video teaches you about the if-else statement in Python. This clip is from the chapter "Python Basics" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn the basics of Python.