Curated Video
Java Multithreading and Parallel Programming Masterclass - Readers-Writers Problem
This video demonstrates the Readers-Writers Problem.
Curated Video
Java Multithreading and Parallel Programming Masterclass - Work Queues for ThreadPools
This video talks about work queues for ThreadPools.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Malware
This video introduces the malicious software and programs that harm our computer systems and networks.
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Module 3 Summary
In this video, we will be summarizing your learning from this module. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Curated Video
Fundamentals of Object-Oriented Programming - C++ - Module 3 Objectives
In this video, we will cover the learning objective of this module. This clip is from the chapter "Module 3" of the series "Fundamentals of Object-Oriented Programming - C++".In this section, you will learn about STL (Standard Template...
Curated Video
Practical Cyber Hacking Skills for Beginners - Cookies Revisited
Here, you will learn about cookies, why and how they are used, and how they affect display of online pages.
Curated Video
Practical Cyber Hacking Skills for Beginners - Calculating Hash Values with PowerShell
In this video, you will learn about calculating the hash values of different types of files using Microsoft PowerShell.
Curated Video
Practical Cyber Hacking Skills for Beginners - Hashing
In this video, we will look at hashing, which is the conversion of key/string/variable into a hash using an algorithm used in malware and antimalware products.
Curated Video
Risk Management for Cyber Security Managers - Ethical Hacking and Pen Testing
In this video, we will discuss ethical hacking and penetration testing and how we can use these techniques to mitigate cyber risks in an organization.
Curated Video
Risk Management for Cyber Security Managers - Information Security Controls
After learning to classify information differently, we will discuss the kinds of security controls available to us to avoid/control risks.
Curated Video
Risk Management for Cyber Security Managers - Threats and Adversaries
Here, we will discuss the different kinds of threats that you might face as a cyber risk manager.
Curated Video
Risk Management for Cyber Security Managers - Introduction to the Course
This brief introductory video overviews the course and briefly outlines cyber risk management concepts.
Curated Video
Learn Midjourney For Your Future 6 Figure Career - Show Me Your World Through Midjourney
In this video, the instructor wants us to showcase our Midjourney world through the platform. You will learn to use the /imagine command and write a prompt that we want to display about. We will experiment with different modulations of...
Curated Video
Spectrum Explained: The Colors of Light
The light spectrum is the collection of colours that are generated when light is dispersed through a medium, such as a prism. This dispersion reveals the various wavelengths of visible light, with each wavelength corresponding to a...
Curated Video
What are the different types of chemical reactions?
In this video, I'm going to show you a simple way to identify the type of chemical reaction that is happening in a given situation. This will help you to understand the process more easily and to carry out the reaction in a more accurate...
Astrum
Quasar Spotted in the Milky Way!
Radio Astronomers discovered hundreds of Quasars hiding in our galaxy.
Curated Video
The Nature of Chemical Bonds: How Electronegativity Shapes Them
Electronegativity differences between atoms determine the type of bond: ionic bonds form when the difference is large, while covalent bonds form with similar electronegativity.
Curated Video
Exploring the World of Rodents: From Rats to Hamsters
In this video, the teacher discusses various types of rodents, their characteristics, habitats, and ecological roles. The video also clarifies misconceptions about otters and other animals being rodents. It provides interesting facts...
Curated Video
Scala in 100 Seconds
Learn the basics of the Scala programming language quickly. Scala is a functional and object-oriented language that runs on the Java Virtual Machine.
Topics Covered:
Scala basics tutorial
Scala vs Java
OOP vs Functional...
Curated Video
Big Tech Events of July, 2024: OpenAI vs Google
Let's take a look at 15 big events that happened in Tech in July 2024, like Google's Alpha Proof math AI, the CrowdStrike Windows disaster, Node.js TypeScript support, new Python web frameworks, and more.
Topics Covered:
Tuaw Zombie...
Curated Video
CSS Changes and New Features
CSS just got a brand new official logo. Let's take a look at some of the coolest new features available to HTML and CSS programmers in 2024.
Topics Covered:
New features added to CSS in 2024
Significance of the color Rebecca...
Astrum
How Bad Is the Radiation on Mars?
How do scientists plan to get astronauts to Mars when space radiation is so strong? What can be done about it? Astrum Answers!