Instructional Video13:35
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory

Higher Ed
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks. This clip is from the chapter...
Instructional Video3:34
Curated Video

Cloud Native Development on Azure with Java 3.2: Register Your App with Your Azure Active Directory Tenant

Higher Ed
One of the key steps to securing our app is to register it with our Azure Active Directory tenant. Let’s go ahead and see how to do this! • Test anonymous access for the application • Add other users to the Azure subscription and define...
Instructional Video0:55
Science360

Computer ESP - Innovation Nation

12th - Higher Ed
Talk about a lie detector test! Researchers at Carnegie Mellon University are designing computer programs that can decode our brain activity and reveal what we're thinking about. See how they're doing it in this episode of Innovation...
Instructional Video6:11
Curated Video

Active Directory with Windows Server 2016 - GPO Client Setting

Higher Ed
In this video, discover implementing GPO client settings, and learn how to use GPO settings for redirecting paths, software deployment, and executing security scripts. This clip is from the chapter "Create and Manage Group Policy" of the...
Instructional Video1:41
The Business Professor

Business Activity Monitoring

Higher Ed
Business activity monitoring is software that aids the monitoring of business activities which are implemented in computer systems.
Instructional Video1:16
Fun Robotics

Activity - Hand Track

Higher Ed
Explaining how to use hand track activity and How the AI works in it
Instructional Video8:44
TED Talks

TED: How I'm fighting bias in algorithms | Joy Buolamwini

12th - Higher Ed
MIT grad student Joy Buolamwini was working with facial analysis software when she noticed a problem: the software didn't detect her face -- because the people who coded the algorithm hadn't taught it to identify a broad range of skin...
Instructional Video20:07
Institute for New Economic Thinking

Yvo Desmedt: Much Ado About Cyber Security

Higher Ed
Private data is leaked more and more in our society. Wikileaks, Facebook, and identity theft are just three examples. Network defenses are constantly under attack from cyber criminals, organized hacktivists, and even disgruntled...
Instructional Video7:28
Curated Video

Tech Titans in Training: How Young Minds are Shaping the Future of Technology

6th - Higher Ed
Dive into the inspiring journeys of young tech prodigies who are not just using technology, but actively shaping its future. From creating apps that turn math revision into a game to developing software that tackles cyberbullying, this...
Instructional Video0:36
Visual Learning Systems

Exploring the African Savanna

9th - 12th
This video provides a description of the African savanna, which is a type of grassland located in the tropics. It highlights the incredible diversity of animals that inhabit this ecosystem, including elephants, lions, rhinoceroses,...
Instructional Video6:30
Curated Video

Cloud Native Development on Azure with Java 3.3: Configure the App to Use Your Azure AD Tenant

Higher Ed
Now that we have registered our app with the Azure Active Directory, the next step is to configure the app to use our Azure AD tenant and then package and redeploy our app. Let’s do it right now! • Change the App ID URI and the reply...
Instructional Video6:37
Curated Video

Tips, Tricks, and Techniques for Node.js Development 1.7: V8 Performance Profiling

Higher Ed
In this video, we will learn how to profile our application to find memory leaks, high consumption on usage, slow reactions and more. • Activate profiling • Collect tick information • Analyze tick information
Instructional Video4:40
Curated Video

Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application

Higher Ed
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...
Instructional Video10:16
Get Me Coding

Apollo 11 Software - Error Code 1202 Explained "Go or No Go"

9th - 11th
An explanation of the error code 1202 that occurred during the Apollo 11 descent to the lunar surface. With great teamwork, the issue was rapidly resolved. But what was it? Also a few unknowns to include the woman behind writing the code...
Instructional Video9:38
Amoeba Sisters

Excretory System and the Nephron

12th - Higher Ed
Join the Amoeba Sisters as they explore the excretory system! This video will first discuss two major functions of the excretory system before focusing on the nephron. The majority of this video will tour through the nephron while...
Instructional Video0:07
Curated Video

Start-ups feature robots to help in the home ++REPLAY++

Higher Ed
GERMANY IFA SHOWSTOPPERSSOURCE: AP TECHNOLOGY RESTRICTIONS: TECHNOLOGY CLIENTS ONLYLENGTH: 6:19SHOTLIST:AP TelevisionBerlin, Germany - 1 September 20161. Various exteriors of IFA consumer electronics fair in Berlin2. Various of...
Instructional Video3:35
Curated Video

SkillSprints: Virus Prevention

Pre-K - Higher Ed
Viruses are not just annoying-- They're annoying. Learn to prevent and effectively deal with computer viruses in this video.
Instructional Video3:56
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer

Higher Ed
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Instructional Video8:17
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - File Transfer Protocol (FTP)

Higher Ed
In this video, the author tackles one of the earliest and most common protocols for moving files, File Transfer Protocol (FTP). He explores how FTP works, including passive mode and active mode, and port triggering. This clip is from the...
Instructional Video10:12
TED Talks

TED: Questioning the universe | Stephen Hawking

12th - Higher Ed
In keeping with the theme of TED2008, professor Stephen Hawking asks some Big Questions about our universe -- How did the universe begin? How did life begin? Are we alone? -- and discusses how we might go about answering them.
Instructional Video4:59
Ancient Lights Media

Atlas of the United States: California

6th - 8th
This program explores the geography, history, and some important cultural features of the Pacific Region of the United States. The individual states of California, Oregon, Washington, Alaska and Hawaii are presented in detail.
Instructional Video9:39
Curated Video

Bug Bounty Program Certification 3.4: Find Bugs Using Network Vulnerability Scanner

Higher Ed
This video explores Nessus installation steps. • Download Nessus network vulnerability scanner • Install process of Nessus tool • Learn about basic scanning using Nessus
Instructional Video15:40
Curated Video

Predictive Analytics with TensorFlow 9.4: An LSTM Predictive Model for Sentiment Analysis

Higher Ed
Sentiment analysis is one of the most widely performed tasks in NLP. An LSTM network can be used to classify short texts into desired categories–that is, classification problems. For example, a set of tweet texts can be categorized as...
Instructional Video6:59
Curated Video

Predictive Analytics with TensorFlow 7.2: Fine-tuning DNN Hyperparameters

Higher Ed
First, we will see DNN performance analysis. Next, we will tune the DNN hyperparameters. • Do DNN performance analysis • Tune the DNN hyperparameters