Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Working with Active Directory
More advanced Windows networks use Active Directory Domains instead of Workgroups. These Domains, especially Microsoft's Active Directory-enabled Domains, provide powerful services for larger networks. This clip is from the chapter...
Curated Video
Cloud Native Development on Azure with Java 3.2: Register Your App with Your Azure Active Directory Tenant
One of the key steps to securing our app is to register it with our Azure Active Directory tenant. Let’s go ahead and see how to do this! • Test anonymous access for the application • Add other users to the Azure subscription and define...
Science360
Computer ESP - Innovation Nation
Talk about a lie detector test! Researchers at Carnegie Mellon University are designing computer programs that can decode our brain activity and reveal what we're thinking about. See how they're doing it in this episode of Innovation...
Curated Video
Active Directory with Windows Server 2016 - GPO Client Setting
In this video, discover implementing GPO client settings, and learn how to use GPO settings for redirecting paths, software deployment, and executing security scripts. This clip is from the chapter "Create and Manage Group Policy" of the...
The Business Professor
Business Activity Monitoring
Business activity monitoring is software that aids the monitoring of business activities which are implemented in computer systems.
Fun Robotics
Activity - Hand Track
Explaining how to use hand track activity and How the AI works in it
TED Talks
TED: How I'm fighting bias in algorithms | Joy Buolamwini
MIT grad student Joy Buolamwini was working with facial analysis software when she noticed a problem: the software didn't detect her face -- because the people who coded the algorithm hadn't taught it to identify a broad range of skin...
Institute for New Economic Thinking
Yvo Desmedt: Much Ado About Cyber Security
Private data is leaked more and more in our society. Wikileaks, Facebook, and identity theft are just three examples. Network defenses are constantly under attack from cyber criminals, organized hacktivists, and even disgruntled...
Curated Video
Tech Titans in Training: How Young Minds are Shaping the Future of Technology
Dive into the inspiring journeys of young tech prodigies who are not just using technology, but actively shaping its future. From creating apps that turn math revision into a game to developing software that tackles cyberbullying, this...
Visual Learning Systems
Exploring the African Savanna
This video provides a description of the African savanna, which is a type of grassland located in the tropics. It highlights the incredible diversity of animals that inhabit this ecosystem, including elephants, lions, rhinoceroses,...
Curated Video
Cloud Native Development on Azure with Java 3.3: Configure the App to Use Your Azure AD Tenant
Now that we have registered our app with the Azure Active Directory, the next step is to configure the app to use our Azure AD tenant and then package and redeploy our app. Let’s do it right now! • Change the App ID URI and the reply...
Curated Video
Tips, Tricks, and Techniques for Node.js Development 1.7: V8 Performance Profiling
In this video, we will learn how to profile our application to find memory leaks, high consumption on usage, slow reactions and more. • Activate profiling • Collect tick information • Analyze tick information
Curated Video
Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...
Get Me Coding
Apollo 11 Software - Error Code 1202 Explained "Go or No Go"
An explanation of the error code 1202 that occurred during the Apollo 11 descent to the lunar surface. With great teamwork, the issue was rapidly resolved. But what was it? Also a few unknowns to include the woman behind writing the code...
Amoeba Sisters
Excretory System and the Nephron
Join the Amoeba Sisters as they explore the excretory system! This video will first discuss two major functions of the excretory system before focusing on the nephron. The majority of this video will tour through the nephron while...
Curated Video
Start-ups feature robots to help in the home ++REPLAY++
GERMANY IFA SHOWSTOPPERSSOURCE: AP TECHNOLOGY RESTRICTIONS: TECHNOLOGY CLIENTS ONLYLENGTH: 6:19SHOTLIST:AP TelevisionBerlin, Germany - 1 September 20161. Various exteriors of IFA consumer electronics fair in Berlin2. Various of...
Curated Video
SkillSprints: Virus Prevention
Viruses are not just annoying-- They're annoying. Learn to prevent and effectively deal with computer viruses in this video.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Anonymizer
In this video, we will look at the tools and software used to make activity on the Internet untraceable.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - File Transfer Protocol (FTP)
In this video, the author tackles one of the earliest and most common protocols for moving files, File Transfer Protocol (FTP). He explores how FTP works, including passive mode and active mode, and port triggering. This clip is from the...
TED Talks
TED: Questioning the universe | Stephen Hawking
In keeping with the theme of TED2008, professor Stephen Hawking asks some Big Questions about our universe -- How did the universe begin? How did life begin? Are we alone? -- and discusses how we might go about answering them.
Ancient Lights Media
Atlas of the United States: California
This program explores the geography, history, and some important cultural features of the Pacific Region of the United States. The individual states of California, Oregon, Washington, Alaska and Hawaii are presented in detail.
Curated Video
Bug Bounty Program Certification 3.4: Find Bugs Using Network Vulnerability Scanner
This video explores Nessus installation steps. • Download Nessus network vulnerability scanner • Install process of Nessus tool • Learn about basic scanning using Nessus
Curated Video
Predictive Analytics with TensorFlow 9.4: An LSTM Predictive Model for Sentiment Analysis
Sentiment analysis is one of the most widely performed tasks in NLP. An LSTM network can be used to classify short texts into desired categories–that is, classification problems. For example, a set of tweet texts can be categorized as...
Curated Video
Predictive Analytics with TensorFlow 7.2: Fine-tuning DNN Hyperparameters
First, we will see DNN performance analysis. Next, we will tune the DNN hyperparameters. • Do DNN performance analysis • Tune the DNN hyperparameters