IDG TECHtalk
How to protect your Windows network login credentials
Recent hacks show that attackers will search for network login credentials in many ways. Make them harder to get.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...
The Business Professor
Understanding Cost-Volume-Profit Analysis and its Key Metrics
This video explains the concept of cost volume profit (CVP) analysis and the relationships between various metrics used in this analysis. The video delves into key metrics such as contribution margin, net income, variable expense ratio,...
Curated Video
Mastering Grunt (Video 16)
Grunt is everywhere. From JavaScript projects in jQuery to Twitter Bootstrap, everyone's using Grunt to convert code, run tests, and produce distributions for production. Web development activities are marked by repetitive tasks such as...
Curated Video
Mastering Grunt (Video 15)
Grunt is everywhere. From JavaScript projects in jQuery to Twitter Bootstrap, everyone's using Grunt to convert code, run tests, and produce distributions for production. Web development activities are marked by repetitive tasks such as...
Prime Coaching Sport
Underarm throws (grade K-3) | Throwing & catching › Teaching Fundamentals of PE
How to teach underarm throws to your students at elementary school
The Wall Street Journal
Navigating the Influencer Economy
Influencers Tinx and Boman Martinez-Reid talk about the promise and peril of social media and the path to building a community online.
Packt
Deleting Documents
MongoDB and Promises (Task App): Deleting Documents This clip is from the chapter "MongoDB and Promises (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will learn about MongoDb
Packt
Bonus - Add Local Storage
OOP Book List Project: Bonus - Add Local Storage This clip is from the chapter "OOP Book List Project" of the series "Modern JavaScript from the Beginning".In this section, you will learn how to build the book list UI, add book to list,...
NASA
Arriving at Asteroid Bennu
Asteroids are the leftover building blocks of the solar system, remnants from the dawn of planet formation that may have delivered organics and water to early Earth, and which could hold clues to the origins of life. Now, a NASA mission...
Curated Video
Apache Maven Beginner to Guru - Compiling and Packaging with Maven
This video demonstrates how to compile and package with Maven. This clip is from the chapter "Getting Started with Maven" of the series "Apache Maven: Beginner to Guru".This section highlights the concept of compiling, packaging, along...
Curated Video
DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Jenkins Tomcat Deploy Script
In this video, you will be able to configure the curl requests to deploy to Tomcat. • For Windows users there is slight deviation on CURL script. Do ensure that you download CURL to a C drive (eg..c:\devops\curl) and set in the path. If...
Curated Video
Advanced Swift 2 Application Development (Video 24)
The number of smartphone users is increasing every single day, and as more and more of them are looking for new and interesting ways to improve their lives through mobile applications, the need for a language that will deploy on all...
The Backyard Scientist
Fortnite Boom Bow IRL - BOOM or BUST?
How could you pass up trying a Boom Bow IRL? It was fun, and a noise maker for sure!
Prime Coaching Sport
Forehand swing | Striking › Teaching Fundamentals of PE
How to teach the tennis forehand swing to your students at elementary school
Curated Video
Describe cyber attacks that could affect a computer system or network : Scanning the Network with OpenVas
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know how to find vulnerabilities...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Azure Site Recovery - Replication Lab
In this video, we will cover Azure site recovery - replication lab. This clip is from the chapter "Data Protection" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains data protection and its agenda...
Curated Video
The Full Stack Web Development - Create Database & Docs In Fauxton - Project in Couch DB
Learning CouchDB: Create Database & Docs In Fauxton - Project in Couch DB This clip is from the chapter "Learning CouchDB" of the series "The Full Stack Web Development".For CouchDB which is also no SQL database, we will checkout Fauxton...
Curated Video
Learning Akka (Video 39)
Akka helps you to build scalable, resilient, and fault-tolerant distributed systems that can provide outstanding performance on local machines as well as over remote networks. Employing the actor model, it is possible to leverage these...
Curated Video
Bug Bounty Program Certification 7.5: Install Acunetix Web Vulnerability Scanner
This video will help you understand web scanning using Acunetix web vulnerability scanner. • Download Acunetix web vulnerability scanner • Installation of web scanner • Reporting of vulnerabilities
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
NASA
NASA | Birth of a Space Laser Instrument
A new C02 laser, which will globally measure carbon dioxide from space, is due to be launched in 2023 on the ASCENDS mission. One of the exciting things about this project is that you can actually watch trees eat and breathe. Of course,...
Next Animation Studio
U.S. sending ‘kamikaze’ Switchblade drones to Ukraine (with VO)
The U.S. is sending 100 ‘kamikaze drones’ to Ukraine to help fight off the Russian invasion
Curated Video
Excel VBA Programming The Complete Guide - Methods with Multiple Arguments
Some object methods can accept multiple arguments. In this lesson, we continue exploring the Workbooks.Open method and two of its parameters -- FileName and ReadOnly. Arguments can be fed in sequentially or with named parameters -- both...