Curated Video
The Full Stack Web Development - Remote DB & Replication
Learning CouchDB: Remote DB & Replication This clip is from the chapter "Learning CouchDB" of the series "The Full Stack Web Development".For CouchDB which is also no SQL database, we will checkout Fauxton – a web interface to manage our...
Curated Video
Master Java Web Services and REST API with Spring Boot- Step 37 - RESTful Web Services - Best Practices
RESTful Web Services - Best Practices: Step 37 - RESTful Web Services - Best Practices This clip is from the chapter "RESTful Web Services - Best Practices" of the series "Master Java Web Services and REST API with Spring Boot".null
Curated Video
DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Blueocean Multibranch Pipeline Configuration Release Build Part 1
This video provides an overview of Jenkins pipeline changes for the release build. This clip is from the chapter "Jenkins Multibranch Pipeline Introduction using Blueocean" of the series "DevOps with GIT(Flow) Jenkins, Artifactory,...
Curated Video
Apache Maven Beginner to Guru - Overview - Using the Oracle Maven Repository
This video demonstrates how to use the Oracle Maven repository. This clip is from the chapter "Maven Repositories" of the series "Apache Maven: Beginner to Guru".This section provides an explanation of Maven repositories.
Programming Electronics Academy
Setting up ThingSpeak: The Internet of Things: 5
A walk through of using ThingSpeak with the ESP8266 for Internet of Things cloud reporting.
friEdTech
How to Keep Chrome from Loading Extensions
Have you ever been frustrated by extensions taking over when you're trying to load and use your Chrome browser? If you're using someone else's computer temporarily, don't wait---keep them from synching in the first place. Here's how!...
NASA
NASA Explores Earth's Magnetic 'Dent'
Earth’s magnetic field acts like a protective shield around the planet, repelling and trapping charged particles from the Sun. But over South America and the southern Atlantic Ocean, an unusually weak spot in the field – called the South...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Cracking Demo
Dan demonstrates how to use a password cracking tool to turn hashed passwords into cleartext. This clip is from the chapter "Cryptography" of the series "CompTIA Security+ Certification SY0-601: The Total Course".This section introduces...
Curated Video
Creating Fully Working QR Codes in Microsoft Word
In this tutorial, you will learn how to easily create functional QR codes within Microsoft Word using the free add-on "QR for Office." By following simple steps, you can insert QR codes that link to websites, email addresses, phone...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Social Engineering Red Flags
You will revisit, and discuss again, all the major social engineering red flags that you can spot in targeted phishing emails, texts and phone calls, as well as social engineering attacks in general. You will understand the main emotions...
Let's Tute
Posting and Analyzing Financial Statements: Completing the Accounting Cycle
This video is a tutorial for accounting students on how to prepare an income statement and balance sheet by posting all the items from the final adjusted trial balance and checking each account in the ledger to ensure accuracy. The video...
Intelligence Squared
Rory Stewart - The perils of foreign involvement in Afghanistan
Rory Stewart will be speaking alongside David Aaronovitch at the IQ2 event. Rory Stewart - IQ2 highlights
Tarver Academy
How to Create a Collaborative YouTube Playlist
In This Episode, Tyler Teaches Us About How to Create a Collaborative YouTube Playlist
Packt
Testing with Authentication
Testing Node.js (Task App): Testing with Authentication This clip is from the chapter "Testing Node.js (Task App)" of the series "The Complete Node.js Developer Course (3rd Edition)".In this section, you will learn about sending emails.
Coach Dan Blewett
Using Focal Points to Improve Command of Curveball
WHO I AM I'm a former pro pitcher who overcame Tommy John surgery twice, earning All-Star selections after both of them.
Coach Dan Blewett
How to Throw a Changeup Behind in the Count
Learn how to throw a changeup when you're behind in the count, which can be a HUGE equalizer when you find yourself struggling to get ahead of hitters.
The Business Professor
Negotiable Instrument - How is Payee Identified
Negotiable Instrument - How is Payee Identified
Curated Video
Learn and Master C Programming - Downloading Visual Studio 2015
The author shows you how to download visual studio 2015 even after the release of Visual Studio 2017. This clip is from the chapter "Installing & Configuring Visual Studio" of the series "Learn and Master C Programming For Absolute...
Seven Dimensions
The Importance of Accountability in the Workplace
Learn how to enhance personal and group accountability with Peter Quarry and Eve Ash’s suggestions, including 360 degree accountability, accurate information, being collaborative, and agreeing on remedial action.
Curated Video
Core Java Programming Course- Classes and Object - Exercise 2
This video presents an exercise on classes and objects. This clip is from the chapter "Object-Oriented Programming" of the series "Learn How to Code: The Complete Core Java Programming Course".This section focuses on the different...
Curated Video
Active Directory with Windows Server 2016 - Preparing AD FS Installation
Walk through the steps to install Active Directory Federation Services, including the list of pre-installation requirements and planning needed to accomplish this installation. This clip is from the chapter "Implement Identity Federation...
Let's Tute
Understanding the Issuing of Shares: Application, Allotment, and Calls
The video discusses the process of issuing shares to the public, with a focus on the different stages in which the company may receive excess applications (oversubscription) or less than the issued capital (undersubscription). The...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Identity Theft
In this interesting module, you will learn how devastating the Equifax hack was for most of us, and how our personal data is most likely already on the Dark Web and in the hands of hackers and fraudsters. You will then be shown how you...
MarketWatch
Here's how your home equity can be used as a financial safety net
For most homeowners, the equity in their house represents one of their biggest assets. The challenge is getting access to that equity without having to sell the house. Here's how a home equity line of credit (HELOC) can help.