Curated Video
Deep Learning with Python (Video 18)
Deep learning is currently one of the best providers of solutions regarding problems in image recognition, speech recognition, object recognition, and natural language with its increasing number of libraries that are available in Python....
Science360
WIFIRE helps firefighters get a jump on wildfires
In recent years, the number and scale of wildfires in the U.S. has risen, threatening cities and forests and forcing large-scale evacuations. NSF is supporting the WIFIRE initiative, led jointly by UC San Diego and the University of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Blockchain Central
ABC of Mining - Proof-Of-Work | Blockchain Central
This week on Blockchain Central: we will uncover the science behind the proof of work mechanism - the most popular and one of the most secure in blockchain ecosystem.
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defense from Adversarial Training Category
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show practical example of defense from...
Curated Video
Deep Learning with Python (Video 11)
Deep learning is currently one of the best providers of solutions regarding problems in image recognition, speech recognition, object recognition, and natural language with its increasing number of libraries that are available in Python....
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Centralized Logging
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM. This clip is...
Octopus TV
Eating Disorders - Neuoplasticity
In this video Janet Treasure discusses neuroplasticity; how the brain wires new infomation to allow for new ideas, skills and behaviours.
Institute for New Economic Thinking
Understanding the Economics of Networks
Prof. Sanjeev Goyal explains his general theory of network formation based on individual incentives, and their economic implications
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Blockchain Central
DApps on Bitcoin Blockchain?
This week on Blockchain Central: we’ll take a closer look at Qtum, a unique blockchain that attempts to link existing crypto currencies and make them interchangeable.
Blockchain Central
What's So Special About NEM? | Blockchain Central
This week on Blockchain Central: we'll talk about a crypto currency and blockchain network called NEM, also known as the "New Economy Movement", and review some unique features that are worth investigating.
__
'Blockchain Central' is...
Next Animation Studio
Bitcoin mining usage may consume 0.5% of world's electricity
New research posits that Bitcoin mining will consume half a percent of the world's total electricity by the end of 2018, then 5 percent in a few years.
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : ReLU Activation, and Preventing Overfitting with Dropout Regularlization
From the section: Deep Learning and Tensorflow: Part 1. In this section, we’ll talk about what Deep Learning is, and how TensorFlow works at a low level. Deep Learning and Tensorflow: Part 1: ReLU Activation, and Preventing Overfitting...
Blockchain Central
Private and Public Keys Explained | Blockchain Central
This week on Blockchain Central: we'll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
XKA Digital
Overcoming challenges by having the courage of your convictions
Julian has spent his entire working career working in information technology and turning ideas into software services or businesses at Apple, AT&T Unisource, the UK Government and as the founder of his own Internet software companies....
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Two and Multi-layer Perceptron ANN
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Two and Multi-layer Perceptron ANN
IDG TECHtalk
Coronavirus pandemic highlights medical IoT security risks
With more of us connecting with our healthcare providers virtually during the coronavirus pandemic, hackers may find it more appealing to attack medical or hospital systems. Increased amounts of data due to telemedicine and medical...
The Wall Street Journal
Lessons from a Data Breach
Businesses suffer data breaches, and there are unexpected issues. What can you do that's right, and what can you avoid that's wrong.
Blockchain Central
Blockchain Forks for Beginners | Blockchain Central
This week on Blockchain Central: we'll talk about the different types of blockchain forks and the differences between them, as well as discuss their preconditions and implications.
__
'Blockchain Central' is your #1 trusted source for...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 11
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing With Real World Natural Images: Working with...