Instructional Video4:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Authorization

Higher Ed
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...
Instructional Video5:13
ShortCutsTv

Foetal Susceptibility and the Dutch Winter Famine

Higher Ed
Obesity and the health problems it brings with has long been seen as a product of genetic predisposition and bad life style choices. But the foetal susceptibility hypothesis introduces another cause, the nourishment an embryo receives...
Instructional Video2:56
Curated Video

Ensemble Machine Learning Techniques 2.1: Problems that Ensemble Learning Solves

Higher Ed
This video talks about the advantages of using ensemble learning. • Define what is Bias, variance • Define what is Bias-Variance tradeoff • Look at the Advantage of using ensemble learning
Instructional Video8:31
Curated Video

High Performance Scientific Computing with C 2.2: Algorithm Complexity and Performance

Higher Ed
How does the design of our programs affect their speed and accuracy? • Learn about floating-point round-off error • Learn about computational complexity • Examine the divide-and-conquer design approach
Instructional Video23:44
Globalive Media

Beyond Innovation: Episode 23

Higher Ed
An AI plays matchmaker for social media influencers, a flowerpot keeps the elderly company and a robot performs a backflip. Plus, Michael and Anthony speak with fitness guru Tracy Anderson about technologies that can help us get in...
Instructional Video23:58
Globalive Media

Beyond Innovation: Episode 13

Higher Ed
Cameras map out streets for self-driving cars, a keyboard fits into a glove and a robot installs drywall. Plus, Anthony and Michael speak with the startup turning air pollution into liquid fuel. Hosted by venture capitalist Anthony...
Instructional Video5:02
Curated Video

Predictive Analytics with TensorFlow 11.1: Reinforcement Learning

Higher Ed
Supervised and unsupervised learning appears at opposite ends of the spectrum, RL exists somewhere in the middle. We use reinforcement learning to discover a good sequence of actions to take the maximum expected rewards. We will also see...
Instructional Video6:35
Zach Star

How Much do Engineers and Scientists Make? Salary and Employment Statistics

12th - Higher Ed
Two common statistics that are helpful to know about any college major are: how much money you can expect to make, and the amount of job opportunities. Here I outline the statistics for many of the most majors and careers when it comes...
Instructional Video11:37
Curated Video

Predictive Analytics with TensorFlow 6.3: Using BOW for Predictive Analytics

Higher Ed
In this video, we will see how to perform a bit more complex predictive analytics using the bag-of-words concept of NLP with TensorFlow. At first, we will formalize the problem, and then will explore the dataset that will be used....
Instructional Video2:23
Curated Video

UX Design for Web Developers (Video 17)

Higher Ed
User experience (UX) design is a theoretical understanding of how users interact with websites. The major challenge developers building a company website face is finding the right balance that fulfills the objectives of the company as...
Instructional Video4:40
Curated Video

Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application

Higher Ed
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...
Instructional Video10:02
Curated Video

Predictive Analytics with TensorFlow 11.2: Developing a Multiarmed Bandit's Predictive Model

Higher Ed
One of the simplest RL problems is called n-armed bandits. The thing is there are n-many slot machines but each has different fixed payout probability. The goal is to maximize the profit by always choosing the machine with the best...
Instructional Video5:11
Curated Video

Predictive Analytics with TensorFlow 10.3: Improved Factorization Machines for Predictive Analytics

Higher Ed
In this video, we will see Neural factorization machines is used to for making predictions under sparse settings by seamlessly combining the linearity of FM and the non-linearity of the neural network. • Understand neural factorization...
Instructional Video23:53
Globalive Media

Beyond Innovation: Episode 7

Higher Ed
An algorithm makes insurance firms smarter, AI and blockchain join forces and the future of cryptocurrencies becomes clearer. Plus, Anthony and Michael speak with the startup making it virtually impossible to hack into sensitive...
Instructional Video8:42
Curated Video

Predictive Analytics with TensorFlow 8.4: CNN-based Predictive Model for Sentiment Analysis

Higher Ed
This video will try to see if we can use CNN for such a use case and experience much better accuracy. Well, the motivation here is that we know CNN is mostly suitable for handling image recognition, classification, or pattern...
Instructional Video10:34
Curated Video

High Performance Scientific Computing with C 1.3: Interpolation and Extrapolation

Higher Ed
How can we "fill in" the data points between discrete data? How can we extend beyond our data points? • Learn linear interpolation • Learn polynomial interpolation • See the dangers of extrapolation
Instructional Video8:07
Curated Video

Predictive Analytics with TensorFlow 5.2: Using kNN for Predictive Analytics

Higher Ed
kNN is non-parametric and instance-based and is used in supervised learning. In this video, we will see working principles of kNN, we will also implement kNN-based predictive model. • See the working principles of kNN • Implement a...
Instructional Video10:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud

Higher Ed
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Instructional Video13:43
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Malware

Higher Ed
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
Instructional Video17:30
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy-Segment 2

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video4:39
Curated Video

Learning D3.JS 5.0 1.2: What Is Data Visualization?

Higher Ed
In this video, we will learn what data visualization is, visual perception, and also what makes a good visualization. • Understand the definition of data visualization • Discuss visual perception • Learn the steps to make a great...
Instructional Video7:52
Curated Video

Predictive Analytics with TensorFlow 9.1: Using BRNN for Image Classification

Higher Ed
We will first provide some contextual information about RNNs. We will see how to implement a BRNN implementation example using the TensorFlow library. The example is using the MNIST database of handwriting. • Look at contextual...
Instructional Video2:17
Curated Video

Java 11 Programming for Beginners 3.3: Inheritance — The Non-Taxable Kind

Higher Ed
Showcase the heaviest concept in OOP by example. • Build a second bot by leveraging the first • Go through theory
Instructional Video10:45
Curated Video

Predictive Analytics with TensorFlow 5.1: Using K-means for Predictive Analytics

Higher Ed
This video will have a brief introduction to the unsupervised machine learning technique. We will also look at k-means for predictive analytics. • Understand the concept of clustering • See how k-means work • Use k-means for predicting...