Instructional Video15:50
Fun Robotics

Project Neural Network

Higher Ed
Design a Neural Network to classify handwritten digits using Keras and TensorFlow
Instructional Video6:41
Packt

CompTIA Network+ Certification N10-007: The Total Course - Change Management

Higher Ed
This video explains the concept of change management. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to work with risk management,...
Instructional Video7:23
Blockchain Central

Is Bitcoin an Anonymous Currency? | Blockchain Central

Higher Ed
On today's episode of Blockchain Central we will shed some more light on the aspect of anonymity in the Bitcoin system. Can your transactions be tracked and what are the consequences? Let's find out!
Instructional Video10:01
Curated Video

Cypress - Modern Automation Testing from Scratch + Framework - Understand Cypress Architecture and its Benefits

Higher Ed
This video helps you understand Cypress architecture and its benefits. This clip is from the chapter "Introduction to Cypress" of the series "Cypress - Modern Automation Testing from Scratch + Framework".This section provides an...
Instructional Video10:20
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Disk RAID Levels

Higher Ed
Data availability, including through disk redundancy, is an aspect of IT security. There are various RAID levels that organize physical disks together to provide performance and/or fault tolerant benefits. This clip is from the chapter...
Instructional Video9:49
Curated Video

Predictive Analytics with TensorFlow 8.5: CNN Model for Emotion Recognition

Higher Ed
We will first train the CNN model based on the dataset from Kaggle and then we will test that model to test a human face to predict one of the emotions. In this video, we show how to develop a CNN for emotion prediction from facial...
Instructional Video7:45
Blockchain Central

Bitcoin From Scratch | Blockchain Central

Higher Ed
This week on Blockchain Central: we will look back at the success story of Bitcoin and see what concept stands behind it. Also, we will discuss the potential of Bitcoin in the future.
Instructional Video2:39
Institute for New Economic Thinking

Mark Thoma - Reform and Restructuring of the Financial and Non-Financial Sectors

Higher Ed
Inaugural Conference @ King's, Session 3.What Kind of Theory to Guide Reform and Restructuring of the Financial and Non-Financial Sectors?
Instructional Video4:47
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Adversarial Attacks and Their Distinctive Features

Higher Ed
From the section: Testing Image Classification. In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video10:16
Curated Video

Apache Kafka - Real-time Stream Processing (Master Class) - Kafka Producer - Micro Project

Higher Ed
In this session, we are going to create a point of sale simulator that generates an infinite number of random but realistic invoices and sends it to the Kafka broker. This clip is from the chapter "Creating Real-time Streams" of the...
Instructional Video3:50
The Business Professor

Preparing to Seek a Promotion

Higher Ed
This Video Explains Preparing to Seek a Promotion
Instructional Video11:13
The Business Professor

Opportunity - Generation Recognition Exploitation

Higher Ed
This Video Explains Opportunity - Generation Recognition Exploitation
Instructional Video7:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Planning

Higher Ed
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Instructional Video10:42
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Laws and regulations

Higher Ed
CISM Domain 1: Information Security Governance: Laws and regulations This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video Boot...
Instructional Video2:11
XKA Digital

Support women at the early stage of their careers

Higher Ed
Keily is an award-winning Director in PwC's Commercial Litigation and Regulatory Disputes team. Prior to joining PwC in January 2017, Keily was a senior associate in the Litigation Group of Morrison & Foerster's London office. There she...
Instructional Video4:45
Science360

Brain States and Consciousness - Mysteries of the Brain

12th - Higher Ed
Neurobiologist Orie Shafer at the University of Michigan is trying to understand how the brain's cells communicate in order to control sleep patterns. To help solve this mystery, Shafer is teaming up with mathematician Victoria Booth to...
Instructional Video5:01
Healthcare Triage

Getting In-Network Care is Harder Than You'd Think

Higher Ed
In a recent Health Affairs article, the Commonwealth Foundation conducted their periodic survey of eleven countries to see how access issues might have improved or worsened. We've covered these data before. Let's update. This is...
Instructional Video10:50
Curated Video

Describe network protocols : Review of Network Programming

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, will learn about the basics of Network programming in general. •...
Instructional Video4:20
Curated Video

Understanding Network Analysis and Critical Path in Project Management

Higher Ed
The video discusses the importance of project management in businesses and how network analysis can aid in identifying the critical path to complete a project efficiently. The speaker explains the concept of activity nodes and how they...
Instructional Video5:26
Blockchain Central

Private and Public Keys Explained

Higher Ed
This week on Blockchain Central: we’ll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Instructional Video6:26
Blockchain Central

EOS - Millions of Transactions Per Second? | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll take a closer look at EOS, a fundamentally new cryptocurrency, that is more centralised than the other ones, but still has a lot of potential to become a strong rival on the market. __ 'Blockchain...
Instructional Video6:00
Blockchain Central

Miners No Longer Needed! | Blockchain Central

Higher Ed
This week on Blockchain Central: we will explore how the IOTA team has developed a miner-less open source protocol which allows to make zero-fee transactions and how it can shape the future of cryptocurrencies?
Podcast27:42
NASA

‎The Invisible Network: 12. Reconnaissance | NASA's The Invisible Network Podcast

Pre-K - Higher Ed
Without communications there is no exploration: To reveal the unknown, a spacecraft must be able to share its data. In a sense, today's space communications networks are like the roadways of ancient empires, allowing information to move...
Podcast24:28
NASA

‎The Invisible Network: 10. 406 MHz | NASA's The Invisible Network Podcast

Pre-K - Higher Ed
Amidst the grandeur of spaceflight, there is a tiny bit of technology that, if not for its major role, might otherwise go unnoticed: distress beacons. This NASA-developed search-and-rescue technology could be life-saving not just for...