Curated Video
Behavioral Design Patterns in C++ - Introduction-Chain Of Responsibility
This video provides an introduction to the CoR (Chain of Responsibility) pattern. This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns in C++".This section focuses on the Chain of...
Curated Video
Behavioral Design Patterns in C++ - Pros and Cons-Chain Of Responsibility
This video talks about the pros and cons of the CoR pattern. This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns in C++".This section focuses on the Chain of Responsibility pattern.
Curated Video
Behavioral Design Patterns in C++ - Basic Implementation-Chain Of Responsibility
This video provides a basic implementation of the CoR pattern. This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns in C++".This section focuses on the Chain of Responsibility pattern.
Curated Video
Design Microservices Architecture with Patterns and Principles - Problem: Cross-Service Queries with Sync Response, Decouple Way, and Low Latency
This video delves deeper into the issues associated with cross-service queries, highlighting the limitations of synchronous responses and the need for decoupling services to enable independent scaling and low latency in query operations....
Curated Video
Behavioral Design Patterns in C++ - Pros and Cons-Command
This video talks about the pros and cons of the command pattern. This clip is from the chapter "Command" of the series "Behavioral Design Patterns in C++".In this section, we will explore the command design pattern, which encapsulates...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - XSRF mitigation - The referer, origin header and the challenge response
Cross Site Request Forgery: XSRF mitigation - The referer, origin header and the challenge response This clip is from the chapter "Cross Site Request Forgery" of the series "Web Security: Common Vulnerabilities And Their Mitigation".We...
Curated Video
Design Microservices Architecture with Patterns and Principles - CQRS - Command Query Responsibility Segregation Pattern
This video introduces the CQRS pattern, which separates the commands (write operations) and queries (read operations) into separate components, optimized data storage and retrieval strategies, enabling scalability and flexibility in...
Curated Video
Behavioral Design Patterns in C++ - Introduction-Command
This video provides an introduction to command patterns. This clip is from the chapter "Command" of the series "Behavioral Design Patterns in C++".In this section, we will explore the command design pattern, which encapsulates requests...
IDG TECHtalk
How to use the arping command: 2-Minute Linux Tips
In this Linux tip, learn how to use the arping command. If it sounds like a combination of arp and ping, that should serve as a hint for how it works. It's a command that you can use to discover or probe systems on your local network.
Curated Video
Web Scraping Tutorial with Scrapy and Python for Beginners: Sending Requests and Receiving Responses
In this educational video, we learn how to scrape websites using Python's Scrapy library. The video walks us through the process of defining start URLs, sending requests, and receiving responses. We also learn how to define the "parse"...
IDG TECHtalk
How to use the pwd command: 2-Minute Linux Tips
In this Linux tip, learn how to use the pwd (present working directory) command, which can tell you where in the file system you are currently located.
Wonderscape
The Executive Branch: Powers and Responsibilities
This video explains the executive branch of the US government, led by the president, who ensures that laws are followed. It covers the qualifications to be president, the role of cabinet members, and the president’s duties, such as...
IDG TECHtalk
How to use the traceroute command: 2-Minute Linux Tips
In this Linux tip, learn how to use the traceroute command. It reports on the route taken to reach a remote system and provides timing details for each "hop" along the way (the time between routers).
Curated Video
GCSE Secondary English Age 13-17 - Reading: Precise Detail in Reading Responses Part 2 - Explained
SchoolOnline's Secondary English videos are brilliant, bite-size tutorial videos delivered by examiners. Ideal for ages 13-17, they cover every key skill in English Reading and Writing that students need to master in clear and easy to...
Curated Video
Cypress - Modern Automation Testing from Scratch + Framework - Handling API Call Directly Without Involving Browser with Cypress
This video explains handling API call directly. This clip is from the chapter "Mocking HTTP Requests/Responses with Cypress (XHR Testing)" of the series "Cypress - Modern Automation Testing from Scratch + Framework".This section explains...
Curated Video
The Art of Doing - Web Development for Beginners - Grid Basics
In this video, we will introduce Grid, a powerful CSS layout system that allows you to create two-dimensional layouts with rows and columns. You will learn how to set up the Grid containers and use Grid properties to define rows,...
Curated Video
Behavioral Design Patterns in C++ - Help System - I
In this video, we will use the example of a help system to understand the CoR pattern. It will also give you an overview of the example. This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns in...
Curated Video
Behavioral Design Patterns in C++ - Logging System - II
In this video, we will try to reduce the coupling between WinApp and the logger classes. This clip is from the chapter "Chain of Responsibility" of the series "Behavioral Design Patterns in C++".This section focuses on the Chain of...
Kids Academy
The President of United States Job | Candidates and Responsibility
The President of United States Job | Candidates and Responsibility Did you ever ask yourself how you become the president of the USA? Well, being the president of any country is a huge responsibility. You need to have a complete balanced...
TED Talks
TED: Dear Facebook, this is how you're breaking democracy | Yaël Eisenstat
Lies are more engaging online than truth, says former CIA analyst, diplomat and Facebook employee Yaël Eisenstat. "As long as [social media] algorithms' goals are to keep us engaged, they will feed us the poison that plays to our worst...
TED Talks
The Great Migration and the power of a single decision
Sometimes, a single decision can change the course of history. Join journalist and author Isabel Wilkerson as she tells the story of the Great Migration, the outpouring of six million African Americans from the Jim Crow South to cities...
Curated Video
Behavioral Design Patterns in C++ - DataList - I
This video starts with another example that will be used to understand how macro commands can be implemented. This clip is from the chapter "Command" of the series "Behavioral Design Patterns in C++".In this section, we will explore the...
Curated Video
Behavioral Design Patterns in C++ - Undo - V
This video helps you store copies of command objects that are executed in a stack and test our implementation. This clip is from the chapter "Command" of the series "Behavioral Design Patterns in C++".In this section, we will explore the...
Curated Video
Behavioral Design Patterns in C++ - TextPad - VIII
This video demonstrates how to use the command pattern to handle commands/events and also achieve loose coupling between the classes. This clip is from the chapter "Command" of the series "Behavioral Design Patterns in C++".In this...