Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Authorization
What role does authorization play in Identity and Access Management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device. This clip is from the chapter "Identity and Account...
ShortCutsTv
Foetal Susceptibility and the Dutch Winter Famine
Obesity and the health problems it brings with has long been seen as a product of genetic predisposition and bad life style choices. But the foetal susceptibility hypothesis introduces another cause, the nourishment an embryo receives...
Curated Video
Ensemble Machine Learning Techniques 2.1: Problems that Ensemble Learning Solves
This video talks about the advantages of using ensemble learning. • Define what is Bias, variance • Define what is Bias-Variance tradeoff • Look at the Advantage of using ensemble learning
Curated Video
High Performance Scientific Computing with C 2.2: Algorithm Complexity and Performance
How does the design of our programs affect their speed and accuracy? • Learn about floating-point round-off error • Learn about computational complexity • Examine the divide-and-conquer design approach
Globalive Media
Beyond Innovation: Episode 23
An AI plays matchmaker for social media influencers, a flowerpot keeps the elderly company and a robot performs a backflip. Plus, Michael and Anthony speak with fitness guru Tracy Anderson about technologies that can help us get in...
Globalive Media
Beyond Innovation: Episode 13
Cameras map out streets for self-driving cars, a keyboard fits into a glove and a robot installs drywall. Plus, Anthony and Michael speak with the startup turning air pollution into liquid fuel. Hosted by venture capitalist Anthony...
Curated Video
Predictive Analytics with TensorFlow 11.1: Reinforcement Learning
Supervised and unsupervised learning appears at opposite ends of the spectrum, RL exists somewhere in the middle. We use reinforcement learning to discover a good sequence of actions to take the maximum expected rewards. We will also see...
Zach Star
How Much do Engineers and Scientists Make? Salary and Employment Statistics
Two common statistics that are helpful to know about any college major are: how much money you can expect to make, and the amount of job opportunities. Here I outline the statistics for many of the most majors and careers when it comes...
Curated Video
Predictive Analytics with TensorFlow 6.3: Using BOW for Predictive Analytics
In this video, we will see how to perform a bit more complex predictive analytics using the bag-of-words concept of NLP with TensorFlow. At first, we will formalize the problem, and then will explore the dataset that will be used....
Curated Video
UX Design for Web Developers (Video 17)
User experience (UX) design is a theoretical understanding of how users interact with websites. The major challenge developers building a company website face is finding the right balance that fulfills the objectives of the company as...
Curated Video
Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...
Curated Video
Predictive Analytics with TensorFlow 11.2: Developing a Multiarmed Bandit's Predictive Model
One of the simplest RL problems is called n-armed bandits. The thing is there are n-many slot machines but each has different fixed payout probability. The goal is to maximize the profit by always choosing the machine with the best...
Curated Video
Predictive Analytics with TensorFlow 10.3: Improved Factorization Machines for Predictive Analytics
In this video, we will see Neural factorization machines is used to for making predictions under sparse settings by seamlessly combining the linearity of FM and the non-linearity of the neural network. • Understand neural factorization...
Globalive Media
Beyond Innovation: Episode 7
An algorithm makes insurance firms smarter, AI and blockchain join forces and the future of cryptocurrencies becomes clearer. Plus, Anthony and Michael speak with the startup making it virtually impossible to hack into sensitive...
Curated Video
Predictive Analytics with TensorFlow 8.4: CNN-based Predictive Model for Sentiment Analysis
This video will try to see if we can use CNN for such a use case and experience much better accuracy. Well, the motivation here is that we know CNN is mostly suitable for handling image recognition, classification, or pattern...
Curated Video
High Performance Scientific Computing with C 1.3: Interpolation and Extrapolation
How can we "fill in" the data points between discrete data? How can we extend beyond our data points? • Learn linear interpolation • Learn polynomial interpolation • See the dangers of extrapolation
Curated Video
Predictive Analytics with TensorFlow 5.2: Using kNN for Predictive Analytics
kNN is non-parametric and instance-based and is used in supervised learning. In this video, we will see working principles of kNN, we will also implement kNN-based predictive model. • See the working principles of kNN • Implement a...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Malware
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy-Segment 2
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Curated Video
Learning D3.JS 5.0 1.2: What Is Data Visualization?
In this video, we will learn what data visualization is, visual perception, and also what makes a good visualization. • Understand the definition of data visualization • Discuss visual perception • Learn the steps to make a great...
Curated Video
Predictive Analytics with TensorFlow 9.1: Using BRNN for Image Classification
We will first provide some contextual information about RNNs. We will see how to implement a BRNN implementation example using the TensorFlow library. The example is using the MNIST database of handwriting. • Look at contextual...
Curated Video
Java 11 Programming for Beginners 3.3: Inheritance — The Non-Taxable Kind
Showcase the heaviest concept in OOP by example. • Build a second bot by leveraging the first • Go through theory
Curated Video
Predictive Analytics with TensorFlow 5.1: Using K-means for Predictive Analytics
This video will have a brief introduction to the unsupervised machine learning technique. We will also look at k-means for predictive analytics. • Understand the concept of clustering • See how k-means work • Use k-means for predicting...