Instructional Video4:40
Curated Video

Deep Learning with Python (Video 18)

Higher Ed
Deep learning is currently one of the best providers of solutions regarding problems in image recognition, speech recognition, object recognition, and natural language with its increasing number of libraries that are available in Python....
Instructional Video3:13
Science360

WIFIRE helps firefighters get a jump on wildfires

12th - Higher Ed
In recent years, the number and scale of wildfires in the U.S. has risen, threatening cities and forests and forcing large-scale evacuations. NSF is supporting the WIFIRE initiative, led jointly by UC San Diego and the University of...
Instructional Video10:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices

Higher Ed
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Instructional Video5:20
Blockchain Central

ABC of Mining - Proof-Of-Work | Blockchain Central

Higher Ed
This week on Blockchain Central: we will uncover the science behind the proof of work mechanism - the most popular and one of the most secure in blockchain ecosystem.
Instructional Video2:56
Packt

Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defense from Adversarial Training Category

Higher Ed
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show practical example of defense from...
Instructional Video5:17
Curated Video

Deep Learning with Python (Video 11)

Higher Ed
Deep learning is currently one of the best providers of solutions regarding problems in image recognition, speech recognition, object recognition, and natural language with its increasing number of libraries that are available in Python....
Instructional Video9:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging

Higher Ed
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Instructional Video8:47
The Business Professor

Value of Personal Connections

Higher Ed
Value of Personal Connections
Instructional Video1:57
Octopus TV

Eating Disorders - Neuoplasticity

Higher Ed
In this video Janet Treasure discusses neuroplasticity; how the brain wires new infomation to allow for new ideas, skills and behaviours.
Instructional Video19:06
Institute for New Economic Thinking

Understanding the Economics of Networks

Higher Ed
Prof. Sanjeev Goyal explains his general theory of network formation based on individual incentives, and their economic implications
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware

Higher Ed
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Instructional Video8:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks

Higher Ed
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Instructional Video6:10
Blockchain Central

DApps on Bitcoin Blockchain?

Higher Ed
This week on Blockchain Central: we’ll take a closer look at Qtum, a unique blockchain that attempts to link existing crypto currencies and make them interchangeable.
Instructional Video5:00
Blockchain Central

What's So Special About NEM? | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll talk about a crypto currency and blockchain network called NEM, also known as the "New Economy Movement", and review some unique features that are worth investigating. __ 'Blockchain Central' is...
Instructional Video1:11
Next Animation Studio

Bitcoin mining usage may consume 0.5% of world's electricity

12th - Higher Ed
New research posits that Bitcoin mining will consume half a percent of the world's total electricity by the end of 2018, then 5 percent in a few years.
Instructional Video5:58
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : ReLU Activation, and Preventing Overfitting with Dropout Regularlization

Higher Ed
From the section: Deep Learning and Tensorflow: Part 1. In this section, we’ll talk about what Deep Learning is, and how TensorFlow works at a low level. Deep Learning and Tensorflow: Part 1: ReLU Activation, and Preventing Overfitting...
Instructional Video5:26
Blockchain Central

Private and Public Keys Explained | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Instructional Video2:48
XKA Digital

Overcoming challenges by having the courage of your convictions

Higher Ed
Julian has spent his entire working career working in information technology and turning ideas into software services or businesses at Apple, AT&T Unisource, the UK Government and as the founder of his own Internet software companies....
Instructional Video7:16
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Two and Multi-layer Perceptron ANN

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Two and Multi-layer Perceptron ANN
Instructional Video11:38
IDG TECHtalk

Coronavirus pandemic highlights medical IoT security risks

Higher Ed
With more of us connecting with our healthcare providers virtually during the coronavirus pandemic, hackers may find it more appealing to attack medical or hospital systems. Increased amounts of data due to telemedicine and medical...
Instructional Video32:09
The Wall Street Journal

Lessons from a Data Breach

Higher Ed
Businesses suffer data breaches, and there are unexpected issues. What can you do that's right, and what can you avoid that's wrong.
Instructional Video5:19
Blockchain Central

Blockchain Forks for Beginners | Blockchain Central

Higher Ed
This week on Blockchain Central: we'll talk about the different types of blockchain forks and the differences between them, as well as discuss their preconditions and implications. __ 'Blockchain Central' is your #1 trusted source for...
Instructional Video1:10
The Business Professor

Network Marketing

Higher Ed
Explanation of Network Marketing
Instructional Video6:46
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 11

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing With Real World Natural Images: Working with...