Instructional Video2:55
SciShow

Brain vs. Computer

12th - Higher Ed
The brain of luchador Hanko wants to take on the worlds fastest supercomputer, "K," in a cage match for bragging rights - which one is the most impressive information processor?
Instructional Video2:45
Curated Video

Binary: The Computer Language

6th - 12th
We use binary every day – although we might not know it. Find out how this number system is used in computers to store large amounts of data. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video3:07
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Solution - Use Assembly to Run Byte Conversions

Higher Ed
In this video, we will discuss the solution to the exercise on using Assembly to run byte conversions from the previous video. This clip is from the chapter "Learn Advanced Solidity II" of the series "The Complete Solidity Course - Zero...
Instructional Video11:38
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - How to Write Assembly in Solidity

Higher Ed
In this video, you will learn about how to write the Assembly language in Solidity and use it to optimize smart contracts. This clip is from the chapter "Learn Advanced Solidity II" of the series "The Complete Solidity Course - Zero to...
Instructional Video3:26
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Exercise - Use Assembly to Run Byte Conversions

Higher Ed
This is an exercise video on using Assembly to run byte conversions. This clip is from the chapter "Learn Advanced Solidity II" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts".This...
Instructional Video6:15
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - A Vulnerable Smart Contract

Higher Ed
In this video, we will discuss what a vulnerable smart contract is and how it can be exploited. This clip is from the chapter "Solidity Patterns I - Cybersecurity" of the series "The Complete Solidity Course - Zero to Advanced for...
Instructional Video3:19
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Solution - Bits and Bytes

Higher Ed
In this video, we will discuss the solution to the exercise on bits and bytes from the previous video. This clip is from the chapter "Learn Solidity Basics IV (Conversions and Special Variables)" of the series "The Complete Solidity...
Instructional Video0:47
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Exercise - Bits and Bytes

Higher Ed
This is an exercise video on bits and bytes. This clip is from the chapter "Learn Solidity Basics IV (Conversions and Special Variables)" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Instructional Video9:58
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Bits and Units - Conversion in Solidity

Higher Ed
In this video, you will learn about bits and units and how to convert them in Solidity. This clip is from the chapter "Learn Solidity Basics IV (Conversions and Special Variables)" of the series "The Complete Solidity Course - Zero to...
Instructional Video8:41
Curated Video

The Complete Solidity Course - Zero to Advanced for Blockchain and Smart Contracts - Bytes Versus Strings in Solidity I

Higher Ed
In this video, you will learn about the difference between bytes and strings in Solidity. This clip is from the chapter "Learn Solidity - Basics III" of the series "The Complete Solidity Course - Zero to Advanced for Blockchain and Smart...
Instructional Video6:16
Curated Video

Fundamentals Of Object-Oriented Programming: Java and IntelliJ - Variables & Data Types

Higher Ed
In this lesson, we will learn about variables and look at the various datatypes available in Java. We will create a new Java project and understand the different data types.
Instructional Video7:11
Curated Video

CompTIA A+ Certification Core 1 (220-1101) - RAM Features

Higher Ed
DRAM varies in other ways, such as single-sided or double-sided DRAM. Different motherboards may or may not be able to take advantage of these features. This clip is from the chapter "Book Chapter 4 - RAM" of the series "CompTIA A+...
Instructional Video7:06
Curated Video

Deep Learning - Convolutional Neural Networks with TensorFlow - Large Datasets and Data Generators

Higher Ed
In this video, you will learn how to work with large image datasets in TensorFlow and Keras with data generators. This clip is from the chapter "Transfer Learning for Computer Vision" of the series "Deep Learning - Convolutional Neural...
Instructional Video4:53
Curated Video

Kafka for Developers - Data Contracts Using Schema Registry - Data Contract and Serialization in Kafka

Higher Ed
In this video, we will investigate how serialization is connected to Kafka and how it benefits the overall Kafka architecture. This clip is from the chapter "Data Contract and Serialization in Kafka" of the series "Kafka for Developers -...
Instructional Video14:45
Curated Video

What is BIG DATA? And introducing the 3 (or 5) V's

10th - Higher Ed
In this video, I want to answer the question, what is Big Data?
Instructional Video1:50
Curated Video

Java for Beginners with Hands-On Program and Capstone Project - Getting all information of a file like file size, etc.

Higher Ed
In this video, we will discover how to retrieve information about a file, such as its size, permissions, and other metadata. This video will explain how to use Java's file-handling APIs to access and retrieve file information, allowing...
Instructional Video7:02
Curated Video

Wireshark D4 V4 - IPv4 Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 4: IPv4 deep-dive
Instructional Video3:40
Curated Video

Wireshark D3 V1 - How is traffic captured

Higher Ed
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 1: How is traffic captured
Instructional Video4:44
Curated Video

Wireshark D2 V4 - View Menu

Higher Ed
DAY TWO - We will explore Wireshark interface in details - Video 4: View menu
Instructional Video9:36
Curated Video

Wireshark D4 V2 - TCP Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 2: TCP deep-dive
Instructional Video2:56
Curated Video

Wireshark D5 V6 - HTTP analysisARP analysis

Higher Ed
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 6: ARP analysis
Instructional Video10:02
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - Constant Throughput Timer Importance

Higher Ed
This video explains the importance of the Constant Throughput Timer. This clip is from the chapter "Timers in JMeter" of the series "Learn JMeter from Scratch on Live Applications - Performance Testing".This section explains the...
Instructional Video8:50
Curated Video

Learn JMeter from Scratch on Live Applications - Performance Testin - Commands to Run Tests in Non-GUI Mode

Higher Ed
This video highlights the commands used to run tests in non-GUI mode. This clip is from the chapter "JMeter Validations in Non-GUI Mode" of the series "Learn JMeter from Scratch on Live Applications - Performance Testing".This section...
Instructional Video3:15
Curated Video

Wireshark D4 V3 - UDP Deep Dive

Higher Ed
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 3: UDP deep-dive