Instructional Video17:54
Curated Video

The Complete React Developer Course (with Hooks and Redux) - Fetching Data from Firebase

Higher Ed
In this video you'll learn how you can fetch data from a Firebase database. This clip is from the chapter "Firebase 101" of the series "The Complete React Developer Course (with Hooks and Redux)".Learn about Firebase 101 here.
Instructional Video1:02
Next Animation Studio

App developers had improper access to user data on Facebook

12th - Higher Ed
Facebook says roughly 100 app developers had improper access to user data through group admins that authorized the apps’ access to Facebook groups.
Instructional Video18:37
Curated Video

C++ Developer - Separate Compilation

Higher Ed
This video explains separate compilation. This clip is from the chapter "Introduction to Classes and Objects" of the series "The Complete C++ Developer Course".This section introduces classes and objects.
Instructional Video17:27
Curated Video

C++ Developer - Variable Scope and Lifetime

Higher Ed
This video explains the scope and lifetime of variables. This clip is from the chapter "Functions" of the series "The Complete C++ Developer Course".This section discusses the various functions in C++.
Instructional Video19:37
Curated Video

C++ Developer - A Book Class

Higher Ed
This video discusses a book class. This clip is from the chapter "Introduction to Classes and Objects" of the series "The Complete C++ Developer Course".This section introduces classes and objects.
Instructional Video6:43
Curated Video

Snowflake - Build and Architect Data Pipelines Using AWS - Lab - Create and Implement Row Level Access Policy

Higher Ed
This is a lab video to create and implement row level access policy. This clip is from the chapter "Snowflake – Data Protection and Governance" of the series "Snowflake - Build and Architect Data Pipelines Using AWS".This section focuses...
Instructional Video9:29
TED Talks

Juliana Rotich: Meet BRCK, Internet access built for Africa

12th - Higher Ed
Tech communities are booming all over Africa, says Nairobi-based Juliana Rotich, cofounder of the open-source software Ushahidi. But it remains challenging to get and stay connected in a region with frequent blackouts and spotty Internet...
Instructional Video5:24
Curated Video

Fundamentals of Secure Software - Broken Access Control

Higher Ed
This video talks about Broken authentication.
Instructional Video8:30
Curated Video

Generative AI Art for Beginners - Tour of AI Art Software

Higher Ed
In this video, we will take you on a tour of different AI art software such as DALL-E 2, Midjourney, StarryAI, NightCafe, stable diffusion, and Craiyon. We will give you an overview of each software's unique features and benefits. This...
Instructional Video35:47
Curated Video

Full Stack Web Development MASTERY Course - Novice to Expert - Git and GitHub in One Lecture

Higher Ed
This video explains in detail about Git and GitHub. This clip is from the chapter "Git and GitHub" of the series "Full Stack Web Development Mastery Course - Novice to Expert".This section focuses on Git and GitHub.
Instructional Video12:22
Catalyst University

Biosynthesis of Major Reactive Oxidative Species

Higher Ed
In this video, I explain the biosynthetic pathway for the major Reactive Oxidative Species (ROS) such as hydrogen peroxide, hydroxyl radicals, and superoxide.
Instructional Video3:38
Curated Video

Fundamentals of Secure Software - Software and Data Integrity Failures

Higher Ed
This video talks about software and data integrity failures.
Instructional Video5:34
Curated Video

Fundamentals of Secure Software - SCA (Software Composition Analysis)

Higher Ed
This video talks about the SCA (Software Composition Analysis).
Instructional Video5:34
Curated Video

Fundamentals of Secure Software - Scanning for OSS Vulnerabilities with Software Composition Analysis

Higher Ed
This video helps in using SCA to find OSS (Open-Source Software) vulnerabilities.
Instructional Video11:09
Curated Video

Fundamentals of Secure Software - Threat Actors and More Definitions

Higher Ed
This video demonstrates the different attackers that threaten software and systems. You will look at more foundational definitions.
Instructional Video2:28
Curated Video

A Detailed Guide to the OWASP Top 10 - #8 Software and Data Integrity Failures

Higher Ed
This video explains A08: 2021 - software and data integrity failures.
Instructional Video3:34
Curated Video

Cloud Native Development on Azure with Java 3.2: Register Your App with Your Azure Active Directory Tenant

Higher Ed
One of the key steps to securing our app is to register it with our Azure Active Directory tenant. Let’s go ahead and see how to do this! • Test anonymous access for the application • Add other users to the Azure subscription and define...
Instructional Video10:36
Packt

Introduction to computer hardware and software : RAM Technology

Higher Ed
From the section: RAM. Here, we learn about RAM technology. Dynamic Random Access Memory (DRAM) comes in a number of versions defined by the doubling of commands they process per clock cycle. It’s important for techs to recognize these...
Instructional Video8:59
Packt

Introduction to computer hardware and software : System Setup

Higher Ed
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. A small system-setup program built into the motherboard firmware enables techs to configure low-level features and options for the system’s...
Instructional Video10:08
Curated Video

Cloud Native Development on Azure with Java 4.4: Configure a Working, Automated Pipeline in Jenkins

Higher Ed
In this video, you will learn how to deploy your sample. • Create a new directory to store the SSH keys • Allow remote users to connect to the Jenkins server via SSH • Use the virtual machine for continuous deployment and make the...
Instructional Video9:26
Curated Video

CISSP Crash Course - Secure Coding Guidelines

Higher Ed
This video explains the weaknesses in software and API security. This clip is from the chapter "Software Development Security" of the series "CISSP Crash Course".null
Instructional Video2:45
Curated Video

Social Media Automation using Python - Introduction and Installation

Higher Ed
In this video, you will learn to install and set up a software development kit called facebook-sdk 3.1.0. developed by the Python community, which is easy to use. This clip is from the chapter "Facebook Automation" of the series "Social...
Instructional Video2:40
Curated Video

Learning R for Data Visualization (Video 15)

Higher Ed
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
Instructional Video3:07
Curated Video

Learning R for Data Visualization (Video 13)

Higher Ed
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...