-
Working with Exceptions
After watching this video; you will be able to identify best practices for working with exceptions.
-
Using Version Control
After watching this video; you will be able to describe the benefits of implementing version control in your documentation and project.
-
Borders- Padding Margins
Borders; padding; and margins enhance the visual appeal of your webpage. In this video; Brad Steele demonstrates how to inspect and adjust the visual elements on your page.
-
Fonts
Debugging fonts in the CSS allows you to precisely define font characteristics. In this video; Brad Steele discusses how to use pixels; emphasis; and point sizes to render your text as expected.
-
Emphasis; Percent; and Pixels
Combining emphasis; percent; and pixels correctly allows your webpages to alter the layout in response to the user’s device; whether a 27-inch monitor or a 3-inch phone. In this video; Brad Steele discusses how to get a layout that is consistent across desktops; laptops; and tablets.
-
Google Chrome Developer Tools
Google Chrome Developer Tools allows you to easily and quickly debug your web applications in the browser. In this video; Brad Steele provides an overview of the features of Developer Tools and demonstrates how to change a public web page's CSS.
-
Google Closure Tools – Linter
Google Closure Tools Linter runs from the command line and allows you to check JavaScript files for style issues such as operator placement; missing semicolons; spacing; and the presence of JsDoc annotations. In this video; Brad Steele explains how to install Closure Linter on various operating systems; and introduces the --nojsdoc; --strict; and fixjsstyle options.
-
Google Webmaster Tools
Google Webmaster Tools offers web application developers a comprehensive toolset to enable them to maximize their web sites' search-engine compatibility. In this video; Brad Steele introduces Google Webmaster Tools’ configurable tools and interactive reporting and advice features.
-
Internet Explorer Developer Tools
The developer tools in Microsoft Internet Explorer save users the time-consuming effort that goes into recompiling webpages to see updates. In this video; Brad Steele demonstrates how to use the developer tools to maintain the markups in CSS and view the changes immediately on the webpage.
-
Microsoft Visual Round Trip Analyzer
Microsoft Visual Round Trip Analyzer helps web developers and testers visualize the download of their page and identify best practices and changes that improve web performance. In this video; Brad Steele discusses how to download and install VRTA and demonstrates how to use the tool to analyze a web site.
-
Mozilla Firebug
Mozilla Firebug allows you to quickly and easily debug web pages and applications in your Firefox browser. In this video; Brad Steele explains how to install and launch Firebug; and then use its tools to debug web applications.
-
Network
Network debugging allows users to overcome the challenging network issues involved in web development. In this video; Brad Steele demonstrates how to analyze network issues with utilities such as ping and traceroute and powerful network analyzers.
-
Optimizing images for the Web with Yahoo’s Smush.it™
Yahoo’s Smush.it™ interactive online tool allows you to upload multiple images for the Web; queues them; advises you of progress; optimizes them without any loss in visual quality; and reports how much space you have saved. In this video; Brad Steele guides you through the features; functions; and requirements of Yahoo! Smush.it.
-
Using dynaTrace AJAX Edition
dynaTrace AJAX edition allows users to analyze the front-end performance of your web-pages and web-applications to quickly determine performance issues. In this video; Brad Steele demonstrates how to use dynaTrace AJAX.
-
Using JSLint
JSLint is a static code analysis tool used in software development for checking if JavaScript source code complies with coding rules. In this video; Brad Steele demonstrates how to find and use JSLint.
-
Working with Breakpoints
Microsoft Visual Studio debugging capabilities enable you to insert breakpoints into your applications; enabling you to pause; obtain snapshot views; and change variables and values. You can insert single breakpoints; step through your code; and disable or delete breakpoints. In this video; Brad Steele demonstrates how to set and manage breakpoints in Visual Studio and introduces the Export feature.
-
Attach the Visual Studio Debugger
The Visual Studio debugger has the ability to attach to a process that is running outside of Visual Studio. In this video; Brad Steele demonstrates how to attach your debugger to a website and debug the server issues that arise.
-
Hello World from C++ in Eclipse
After watching this video; you will be able to create a 'Hello; World!' C++ program in Eclipse C++.
-
Hello World from Bash in Vim
After watching this video; you will be able to create a 'Hello; World!' Bash script in Ubuntu using Vim from the command line.
-
Hello World from C
After watching this video; you will be able to create a 'Hello; World!' C program in emacs; compile it with the GNU gcc compiler; and run it with gdb.
-
Hello World from C in Emacs and LLVM
After watching this video; you will be able to create a 'Hello; World!' C program in emacs; compile it with the llvm clang compiler; and run it with lldb.
-
Hello World from C# in Visual Studio
After watching this video; you will be able to create a 'Hello; World!' C# program in Visual Studio.
-
Hello World from C++ in Visual Studio
After watching this video; you will be able to create a 'Hello; World!' C++ program in Microsoft Visual Studio.
-
Hello World from Clojure Using Leiningen
After watching this video; you will be able to create a 'Hello; World!' Clojure program using Leiningen.
-
Hello World from GNU Autotools with C
After watching this video; you will be able to create a 'Hello; World!' C program using the GNU Autotools.
-
Hello World from HTML5/CSS3 in WebMatrix
After watching this video; you will be able to create an HTML page that displays 'Hello; World!' with the CSS3 text-shadow effect in WebMatrix.
-
Hello World from Java in Eclipse
After watching this video; you will be able to create a 'Hello; World!' Java program in Eclipse.
-
Hello World from Java in IntelliJ IDEA
After watching this video; you will be able to create a 'Hello; World!' Java program in IntelliJ IDEA.
-
Hello World from JavaScript in Aptana Studio
After watching this video; you will be able to create an HTML page with JavaScript that outputs 'Hello; World!' using Aptana Studio.
-
Hello World from JavaScript in Firefox
After watching this video; you will be able to write 'Hello; World!' to the JavaScript console of your web browser.
-
Hello World from Node.js in WebMatrix
After watching this video; you will be able to create a 'Hello; World!' JavaScript program in Node.js in WebMatrix.
-
Hello World from PHP and MySQL
After watching this video; you will be able to create a PHP program that uses MySQL to SELECT the literal string; 'Hello; World!'; and prints the result.
-
Hello World from PHP in WebMatrix
After watching this video; you will be able to create a 'Hello; World!' PHP program in WebMatrix.
-
Hello World from PHP in Zend Studio
After watching this video; you will be able to create a 'Hello; World!' PHP program in Zend Studio.
-
Hello World from PHP through NGINX and FastCGI
After watching this video; you will be able to configure php-fpm to output 'Hello; World!' from a PHP page through the NGINX web server.
-
Hello World from PyDev
After watching this video; you will be able to create a 'Hello; World!' python program in PyDev in Aptana Studio.
-
Hello World from Python in PyCharm
After watching this video; you will be able to create a 'Hello; World!' python program in PyCharm.
-
Hello World from RStudio
After watching this video; you will be able to create a 'Hello; World!' program in RStudio using the R language.
-
Hello World from Ruby in Aptana Studio
After watching this video; you will be able to create a ruby project that outputs 'Hello; World!' using Aptana Studio.
-
Hello World from Ruby on Rails
After watching this video; you will be able to create a rubyonrails web application that outputs 'Hello; World!'.
-
Hello World from Rust
After watching this video; you will be able to create a 'Hello; World!' Rust program; compile it with rustc; and run it.
-
Hello World from SQL in MySQL
After watching this video; you will be able to verify a MySQL install by executing mysql from the command line to SELECT the string 'Hello; World!'.
-
Why Write 'Hello; World!'?
After watching this video; you will be able to discuss the reasons behind writing a 'Hello; World!' program when learning a new programming language and/or environment.
-
Basic If Statements
In Java; you use conditional statements to direct the code to react a certain way; based on certain conditions. You use an If conditional statement to perform actions based on the result of a conditional comparison. In this video; Mark Lassoff demonstrates how to write an If statement.
-
Compiling a Java Program
Java code needs to be built into a program that the computer can execute. This process is called compiling. In this video; Mark Lassoff demonstrates how to compile a Java program in the command line.
-
Creating Hello World
The Hello World program is traditionally one of the first programs written by students in languages such as Java. Java programs can be written in any plain text editor. In this video; Mark Lassoff demonstrates how to write the source code for the Hello World program.
-
Declaring Variables
In Java; every variable you use for storage is associated with a specific data type; such as integer or Boolean. You also need to initialize; or assign a value to; a variable. In this video; Mark Lassoff demonstrates how to declare and initialize variables.
-
Loops in Java
In Java; you can execute a series of commands more than once using a loop. There are three types of loop structures; namely For; While; and Do While loops. In this video; Mark Lassoff demonstrates how to use each type of loop to execute a command.
-
Mathematical Operations
In Java; you can perform a number of arithmetic operations ranging from simple to complex. In this video; Mark Lassoff demonstrates how to perform some basic math operations.
-
Obtaining Variable Values
In Java; once a value is stored in a variable; you have to access it to read it into memory. In this video; Mark Lassoff demonstrates how to access values in different types of variables.
-
Using a Package
Java uses an organization system called the package system. Each application and class you write should be placed in a predetermined folder; known as a package. The package hierarchy prevents collisions between references to variables that have the same name in different programs. In this video; Mark Lassoff demonstrates how to use the package command to create a package.
-
ADLC Product Phases
In Software Practices (Waterfall); the Operation and Maintenance phase is the longest and most expensive phase of the Application Development Lifecycle Product phases. In this video; Brigitte Birze uses the Operation and Maintenance phase to explain the maintenance and operational activities required for the project.
-
ADLC Startup Phases
In Software Practices (Waterfall); the Application Development Lifecycle Startup phases are where a product or system is born. In this video; Brigitte Birze uses the Application Development Lifecycle Startup phases to explain the Initiation; System Concept; and Planning phases of a project.
-
Agile Software Models
When developing software using an Agile Development Model; there are two types of processes which can be implemented to develop software. In this video; Birgitte Birze explains the values of the Agile Manifesto; the Test Driven Development practices shared by many Agile software processes; as well as the user story. The Extreme Programming and SCRUM process methods are then explained.
-
SDLC Analysis Phase
The SDLC Analysis phase of Waterfall lays the foundation for software development and is vital to establishing the functional and system requirements of the project. In this video; Brigette Birze demonstrates the Analysis phase and highlights the steps used to uncover and document the requirement specifications of the project under development.
-
SDLC Cost of Change
The Waterfall sequential design process is useful in tracking changes during the software development process to minimise costs; as the further along in the project you are; the more expensive it is to implement changes. In this video; Brigitte Birze demonstrates how to calculate the cost of change as the project progresses.
-
SDLC Deployment Phase
The Deployment phase of Waterfall is there to ensure that the project is successfully deployed to the customer without any defects or bugs. In this video; Brigette Birze expands on the Deployment phase and discusses the process of transforming validated software into full production software.
-
SDLC Design Phase
The SDLC Design phase of Waterfall is where the Development team establishes how to implement the application in order for it to fulfil its functional and system requirements. In this video; Brigette Birze demonstrates the Design phase; describing how to implement requirements such as the Detail Design; Quality Assurance; and Architecture Design processes.
-
SDLC Implementation Phase
In Waterfall; the implementation phase of software development is generally the longest phase of the development life cycle. In this video; Birgitte Birze discusses the implementation phase of software development and what exactly it entails within different build environments.
-
SDLC Umbrella Tasks
In Software Practices (Waterfall); the Umbrella Tasks are management activities that are not contained in a single phase of the Software Development Lifecycle (SDLC). In this video; Brigitte Birze uses the SDLC Umbrella Tasks to explain formal technical reviews; software quality assurance; software configuration management; reusability management; objective quantitative measurement data; documentation; and risk management.
-
SDLC Validation Phase
During the SDLC Validation phase of Waterfall; the software undergoes robust testing by an independent QA team to find and fix defects before the software is deployed. In this video; Brigette Birze explains the aim of the Validation phase and the testing performed by the QA Test Engineers.
-
Sequential Approach Software Models
Within Software Practices; there are a number of sequential approach software models that follow the SDLC phases. In this video; Brigette Birze discusses Waterfall; Sashimi; and the V-Model; compares the models; and discusses the pros and cons of each approach.
-
The Application Development Lifecycle (ADLC)
Software Practices (Waterfall) provides developers with an Application Development Lifecycle (ADLC). In this video; Brigitte Birze discusses the ADLC as a framework with distinct phases; each of which feeds into later phases; and also identifies the phases that constitute the Software Development Lifecycle; which might be repeated a number of times within one ADLC.
-
The Iterative Approach Software Method
Within Software Practices; the iterative approach to software development makes for a very adaptive development process. In this video; Brigette Birze explains the key features of the iterative approach and how it can benefit the SDLC process.
-
The Sequential Approach Software Method
The Waterfall sequential design process is useful for various software application approaches. In this video; Brigitte Birze demonstrates how to implement the sequential approach with software modelling; and select and apply the most suitable methods for your project.
-
The Software Development Lifecycles (SDLC)
In Software Practices (Waterfall); the framework for developing and managing software projects is called the Software Development Lifecycle (SDLC). In this video; Brigitte Birze uses the SDLC framework to explain the Analysis; Design; Development; Validation; and Deployment phases.
-
Agile Method
After watching this video; you will be able to describe the features and benefits of using the agile software development method.
-
Application Security Considerations
After watching this video; you will be able to identify the goal of application security and the need to consider security issues in the design and development of software applications.
-
Formatting Code
After watching this video; you will be able to identify best formatting practices for use in your source code.
-
Functionality Errors
After watching this video; you will be able to describe how functionality errors occur and how to minimize them.
-
Authentication Fundamentals
After watching this video; you will be able to recognize the importance of implementing authentication within your application and how it relates to security issues.
-
Authentication Management
After watching this video; you will be able to identify best practices for implementing authentication within your application.
-
Authentication Scope
After watching this video; you will be able to identify the various resources requiring authentication and potential associated security issues.
-
Bug Detection Techniques
After watching this video; you will be able to describe the techniques for detecting bugs when testing your programs.
-
Class Constructors and Destructors
After watching this video; you will be able to recognize best practices for using constructors and destructors.
-
Class Creation
After watching this video; you will be able to identify best practices for declaring a class and creating an object of that class.
-
Class Fundamentals
After watching this video; you will be able to describe the capabilities of a class; including abstraction and encapsulation.
-
Code Improvement Errors
After watching this video; you will be able to identify the sources of errors introduced by code improvements and how best to minimize these errors.
-
Conditions for Refactoring
After watching this video; you will be able to identify code conditions that can benefit from refactoring.
-
Data Validation and Security
After watching this video; you will be able to identify the importance of data validation within your application.
-
Debugging Procedure
After watching this video; you will be able to list the steps involved when debugging your source code.
-
Development Documentation Fundamentals
After watching this video; you will be able to describe the purpose; main sections; and importance of a development document.
-
Error Fundamentals
After watching this video; you will be able to describe the sources and effects of errors within your software application.
-
Error Logging
After watching this video; you will be able to list information contained in error logs and how to securely handle the log files your application generates.
-
Establishing Coding Standards
After watching this video; you will be able to describe the benefits associated with implementing coding standards in your project.
-
Handling Method Arguments
After watching this video; you will be able to identify best practices for working with arguments and distinguish between by value and by reference parameters.
-
Handling Method Return Values
After watching this video; you will be able to identify best practices for working with return values.
-
Identifier Fundamentals
After watching this video; you will be able to recognize the benefits of using best practices for naming identifiers in your program.
-
Identifier Naming
After watching this video; you will be able to recognize the best practices used when naming identifiers.
-
Identifier Styles
After watching this video; you will be able to recognize the various styles used in different programming languages for naming identifiers.
-
Identifying Well-written Source Code
After watching this video; you will be able to identify source code that utilizes best coding conventions.
-
Inheritance and Polymorphism
After watching this video; you will be able to recognize best practices for implementing inheritance and polymorphism.
-
Input Data Validation
After watching this video; you will be able to describe the main functions that your data validation should perform on input data.
-
Inspection Guidelines
After watching this video; you will be able to list the stages of a software inspection and describe the function of each.
-
Inspection Roles
After watching this video; you will be able to list the roles and responsibilities of the participants involved in peer-review inspections.
-
Interfaces and Abstract Classes
After watching this video; you will be able to describe the characteristics and use of interfaces and abstract classes.
-
Iterative Development Models
After watching this video; you will be able to identify the characteristics of the iterative software development model.
-
Maintaining Development Documentation
After watching this video; you will be able to identify the importance of maintaining and updating your development document.
-
Maintenance Fundamentals
After watching this video; you will be able to identify the benefits of performing maintenance on source code.
-
Method Cohesion
After watching this video; you will be able to describe method cohesion and its advantages when creating methods.
-
Method Fundamentals
After watching this video; you will be able to describe the purpose of methods and be able to distinguish between methods and procedures.
-
Optimizing Conditional Statements
After watching this video; you will be able to describe how conditional statements in your source code can be optimized with refactoring.
-
Optimizing Method Calls
After watching this video; you will be able to recognize how refactoring can help optimize calls to methods in your source code.
-
Output Data Validation
After watching this video; you will be able to identify the importance of validating and encoding output data returned from your application.
-
Packaging Code in Methods
After watching this video; you will be able to describe how refactoring can be implemented to improve methods in your source code.
-
Password Creation
After watching this video; you will be able to recognize best practices for creating secure passwords.
-
Password Maintenance
After watching this video; you will be able to recognize best practices for allowing users to change or recover passwords.
-
Password Management
After watching this video; you will be able to identify best practices for managing and maintaining passwords.
-
Peer Review Inspection
After watching this video; you will be able to identify the types of peer reviews and describe the benefits of performing inspections on your source code.
-
Potential Security Issue Sources
After watching this video; you will be able to recognize the various ways that your application can develop security problems.
-
Programming Errors
After watching this video; you will be able to list and describe the most common types of errors caused by poor programming.
-
Prototyping Method
After watching this video; you will be able to describe the features and benefits of using the protyping method for software development.
-
Rapid Application Development (RAD) Method
After watching this video; you will be able to describe the features and benefits of using the RAD method for development.
-
Refactoring Benefits
After watching this video; you will be able to describe what refactoring is and recognize the benefits of performing code refactoring.
-
Refactoring Best Practices
After watching this video; you will be able to identify best practices for refactoring.
-
Refactoring Process
After watching this video; you will be able to list the steps involved when performing refactoring on source code.
-
Security Planning
After watching this video; you will be able to list the guidelines for implementing security in your software development process.
-
Security Problem Impact
After watching this video; you will be able to identify the possible consequences of security problems.
-
Self-documenting Code
After watching this video; you will be able to describe the concept of self-documenting code and its importance in the creation process.
-
Sequential Development Model
After watching this video; you will be able to identify the characteristics of the sequential software development model.
-
Software Testing Methods
After watching this video; you will be able to list the various methods for testing your programs.
-
Spiral Method
After watching this video; you will be able to describe the features and benefits of using the Spiral software development method.
-
Transferring Functionality between Objects
After watching this video; you will be able to recognize techniques for refactoring program functionality when working with objects.
-
Unit Testing Principles
After watching this video; you will be able to describe the purpose and principles of unit testing.
-
Using Abstract Classes
After watching this video; you will be able to recongnize how to create and work with abstract classes.
-
Using Identifier Names
After watching this video; you will be able to recognize identifiers that follow the best practices.
-
Using Input Data Validation
After watching this video; you will be able to recognize code that follows best practices for validating input data.
-
Using Interfaces and Abstract Classes
After watching this video; you will be able to work with interfaces and abstract classes.
-
Using Output Data Validation
After watching this video; you will be able to recognize code that follows best practices for validating output data.
-
Waterfall Method
After watching this video; you will be able to describe the features and benefits of using the waterfall method for development.
-
Working with Data
After watching this video; you will be able to describe refactoring techniques to simplify how your program works with data.
-
Working with Generalizations
After watching this video; you will be able to describe how to improve generalization in object-oriented programming through refactoring.
-
Writing Good Code
After watching this video; you will be able to recognize the benefits and importance of writing quality source code.
-
Writing Well-structured Methods
After watching this video; you will be able to identify source code that follows best practices for method writing.
-
Examining the Development Stage
After watching this video; you will be able to list the methodologies and importance of documentation during the software development stage.
-
Identifying Benefits of Coding Best Practices
After watching this video; you will be able to describe the benefits of following best practices when creating source code.
-
Identifying Software Security Best Practices
After watching this video; you will be able to list the best practices for creating secure applications.
-
Importance of Software Planning and Design
After watching this video; you will be able to describe the importance of the planning and design stages of software development.
-
Maintaining and Debugging Code
After watching this video; you will be able to identify the benefits of maintaining; testing; and debugging source code.
-
Understanding Refactoring
After watching this video; you will be able to list the benefits and categories of refactoring code.
-
Analyzing Web Sites Using WebPagetest
WebPagetest is an online utility that allows you to analyze a web site’s performance by running four different test types. In this video; Brad Steele outlines the Analytical Review's and Visual Comparison's speed and comparative speed tests; the Mobile test's multi-site graphical test; and the Traceroute test.
-
Bundling and Minification
Bundling and minification improve load time by reducing the number of requests to the server and reducing the size of requested assets; such as CSS and JavaScript. In this video; Brad Steele discusses the basics of bundling and minification.
-
Caching in ASP.net
Caching in ASP.net allows users to overcome slow webpage response due to data access; third-party integration; and other issues. In this video; Brad Steele demonstrates how to implement efficient caching strategies.
-
CleanCSS
CleanCSS is a web site where you can analyze your CSS and set optimization options before compressing it. In this video; Brad Steele uses CleanCSS to optimize CSS.
-
Compiled CSS using Sass (Style With Attitude)
Compiled CSS; using Sass (Style with attitude) from the command line; enables you to build CSS using programmatic concepts. In this video; Brad Steele demonstrates how to access and use the Sass compiler.
-
Global ASAX
Global.asax is a special file that contains code to allow your website to respond to an event for the entire application or session. In this video; Brad Steele discusses how Global.asax runs in response to specific events.
-
IIS Compression
IIS compression allows you to effectively reduce page load times and help low-bandwidth users enjoy a better browsing experience with your site. In this video; Brad Steele demonstrates how to enable static and dynamic HTTP compression in IIS and select additional compression options.
-
IIS Log Files
IIS log files allow users to record the activity of their websites. In this video; Brad Steele demonstrates how to configure your log files in your default website.
-
Load and Stress Testing
When testing the robustness of your web site you should perform load testing to gauge how the site performs under normal conditions and over time; as well as stress testing to determine how it copes with abnormally heavy loads. In this video; Brad Steele discusses how load and stress testing are used to determine the performance of a web site.
-
Network Monitor
Microsoft Network Monitor lets you perform network troubleshooting tasks by allowing you to view and analyze network traffic in real-time. In this video; Brad Steele uses Microsoft Network Monitor 3.4 to monitor network activity and view an analysis of the activity.
-
Slow Sites
Slow sites frustrate your site users and reduce traffic to the site. In this video; Brad Steele discusses some topics to review when architecting web applications to ensure top performance.
-
Tuning JavaScript
WebStorm is an IDE with many features that allow you to create and tune your JavaScript code. In this video; Brad Steele highlights the main features of the WebStorm interface for optimizing JavaScript code.
-
Using Fiddler2 to Monitor Network Traffic
Fiddler2 is a web debugging proxy which logs all HTTP traffic between your computer and the Internet. In this video; Brad Steele demonstrates the basics of using Fiddler2 for monitoring your network traffic.
-
ViewState in ASP.net
The ViewState is the hidden form field written into your page response by ASP.net that stores information about the dynamic ASP.net controls on your page. In this video; Brad Steele demonstrates how to manage your ViewState in ASP.net for top performance of your webpage.
-
Working with Scalable Images
Pending W3C recommendations; the Scalable Vector Graphic (SVG) tag remains the best way to deliver scalable graphics and render them in the browser. In this video; Brad Steele details the role of CSS3 media queries; the implications of image size; and the use of JavaScript subject to selective client-detection methods.
-
Error Handling
After watching this video; you will be able to describe best practices for safely and securely handling errors in your application.
-
Using Comments
After watching this video; you will be able to describe why you should include comments in your code and distinguish good comments from bad ones.
-
Data Protection
After watching this video; you will be able to identify best practices for securing data that is accessible by your application.
-
Memory Management
After watching this video; you will be able to identify best practices your application should use for managing memory.
-
File Management
After watching this video; you will be able to describe best practices for securing the uploading of files from within your application.
-
Database Security
After watching this video; you will be able to describe best practices for securing database access from your application.
-
Cloud Implementation Using Azure IoT: Serial Communication Between Pi and Arduino
After watching this video, you will be able to implement serial communication between Pi and Arduino.
-
Cloud Implementation Using Azure IoT: Introducing IoT on the Cloud
After watching this video, you will be able to identify the essential capabilities and benefits of IoT with cloud implementation.
-
Arduino Language: Exercise: Working with Arduino Boards
After watching this video, you will be able to connect Arduino board to a computer, write and compile code, and upload code to the Arduino board.
-
Cloud Implementation Using Azure IoT: Exercise: Working with IoT Hub
After watching this video, you will be able to create an IoT Hub, define endpoint and apply filter rule to permit IP ranges for connectivity.
-
Cloud Implementation Using Azure IoT: IoT Hub Services
After watching this video, you will be able to create IoT Hub services.
-
Cloud Implementation Using Azure IoT: Register and Track Devices with IoT Hub
After watching this video, you will be able to demonstrate how to configure IoT Hub to register and track devices.
-
Cloud Implementation Using Azure IoT: Fundamentals of Microsoft Azure IoT Suite
After watching this video, you will be able to demonstrate the suite capabilities of Azure IOT.
-
Cloud Implementation Using Azure IoT: IoT Hub - The Azure IoT Cloud Gateway
After watching this video, you will be able to illustrate the essential capabilities provided by IoT Hub.
-
Cloud Implementation Using Azure IoT: AWS IoT Services
After watching this video, you will be able to illustrate the capabilities and features afforded by AWS IoT.
-
Cloud Implementation Using Azure IoT: Microsoft Azure IoT Reference Architecture
After watching this video, you will be able to illustrate the reference architecture and capabilities of Azure IoT.
-
Azure IoT Hub: Live Monitoring of Incoming Data
After watching this video, you will be able to implement live monitoring of incoming data.
-
Azure IoT Hub: Data Threshold Values for Alerts
After watching this video, you will be able to configure data threshold values to generate alerts.
-
Azure IoT Hub: Configure Messaging to Relay Data To and From Azure
After watching this video, you will be able to demonstrate how to configure messaging to relay data to and from Azure.
-
Azure IoT Hub: Stream Analytics and IoT Hub
After watching this video, you will be able to implement stream analytics on IoT Hub.
-
Azure IoT Hub: Stream Analytics Jobs
After watching this video, you will be able to demonstrate how to construct Azure Stream Analytics jobs.
-
Azure IoT Hub: Exercise: Working with IoT Hub and Jobs
After watching this video, you will be able to configure storage, create a job, and create an alert for IoT Hub.
-
Azure IoT Hub: Device Management Using Node.js
After watching this video, you will be able to manage devices using Node.js.
-
Azure IoT Hub: Connect Sensor Module to Devices
After watching this video, you will be able to identify the sensory modules and devices to facilitate productive utilization from the perspective of IoT.
-
Azure IoT Hub: Diagnose and Update IoT Devices Remotely
After watching this video, you will be able to illustrate the remote diagnostic capability on IoT devices.
-
Azure IoT Hub: Raspberry Pi Azure IoT Online Simulator
After watching this video, you will be able to demonstrate how to configure and utilize Azure IoT online simulator.
-
MicroPython Board: Using REPL Console with Boards
After watching this video, you will be able to illustrate how to use REPL console to interact with boards.
-
MicroPython Board: MicroPython Board
After watching this video, you will be able to specify the essential features of MicroPython boards.
-
MicroPython Board: Packaging Code Using Setup Tools
After watching this video, you will be able to demonstrate how to package code using the setup tools.
-
MicroPython Board: Python Debugger
After watching this video, you will be able to demonstrate how to debug Python code using Python debugger.
-
MicroPython & Security: Pyboard Components
After watching this video, you will be able to list all the essential components of Pyboard.
-
MicroPython & Security: Load Firmware on the Pyboard
After watching this video, you will be able to demonstrate how to load firmware on the Pyboard.
-
MicroPython Board: Popular MicroPython-Compatible Boards
After watching this video, you will be able to specify some of the most popular MicroPython-compatible boards .
-
MicroPython Board: Exercise: Working with Pyboard
After watching this video, you will be able to set up and connect Pyboard using Putty and test Pyboard by turning the Pyboard on and off.
-
MicroPython Board: Pymate and Pycom Boards
After watching this video, you will be able to illustrate the features and capabilities of Pymate and Pycom boards.
-
MicroPython Board: Installing Arduino IDE
After watching this video, you will be able to install Arduino IDE .
-
MicroPython Board: Setting up MicroPython Board
After watching this video, you will be able to set up MicroPython board.
-
MicroPython & Security: Critical MicroPython Libraries
After watching this video, you will be able to list the critical libraries and functionalities of MicroPython that can be implemented.
-
MicroPython & Security: Set Up the Network with Pyboard
After watching this video, you will be able to demonstrate the network setup capabilities of Pyboard.
-
MicroPython & Security: Hands-on MicroPython
After watching this video, you will be able to program with MicroPython.
-
Using Raspberry Pi & OpenCV: Raspberry Pi Device Architecture and Components
After watching this video, you will be able to identify the critical architecture and components of Raspberry Pi devices.
-
Using Raspberry Pi & OpenCV: Introducing Raspberry Pi and Arduino
After watching this video, you will be able to illustrate the capabilities of Raspberry Pi and Arduino .
-
MicroPython & Security: Exercise: Working with Libraries
After watching this video, you will be able to use math library to manage numbers, machine library to get CPU frequency, and network library to test network connection.
-
Using Raspberry Pi & OpenCV: Security Threat Use Cases
After watching this video, you will be able to specify typical and common use cases of security treats.
-
MicroPython & Security: Implement AAA Framework
After watching this video, you will be able to demonstrate how to implement AAA frameworks with IoT .
-
MicroPython & Security: Cloud Security Concerns
After watching this video, you will be able to specify the critical security concerns around the cloud Implementation of IoT.
-
MicroPython & Security: Securing the IoT Ecosystem
After watching this video, you will be able to illustrate the vulnerabilities and security implementation on the IoT ecosystem.
-
MicroPython & Security: IoT Security Architecture
After watching this video, you will be able to identify the architecture of IoT security.
-
Using Raspberry Pi & OpenCV: Installing Raspberry Pi
After watching this video, you will be able to install Raspberry Pi.
-
Using Raspberry Pi & OpenCV: Working with OpenCV
After watching this video, you will be able to identify the need for OpenCV and its relevance with IoT devices.
-
Using Raspberry Pi & OpenCV: Installing OpenCV
After watching this video, you will be able to install OpenCV.
-
Raspi-config & GPIO: Introducing Raspberry GPIO
After watching this video, you will be able to recognize GPIO and its essential characteristics.
-
Raspi-config & GPIO: Accessing GPIO Using Python
After watching this video, you will be able to demonstrate how to access GPIO pins using Python.
-
Raspi-config & GPIO: Connecting to Wi-Fi
After watching this video, you will be able to enable Wi-Fi connectivity for devices.
-
Raspi-config & GPIO: Setting Up Remote Access
After watching this video, you will be able to demonstrate the mechanism of setting up remote access.
-
Raspi-config & GPIO: Using Raspi-config to Configure Pi
After watching this video, you will be able to use Raspi-config to configure Pi.
-
Raspi-config & GPIO: Managing Users with Pi
After watching this video, you will be able to demonstrate how to facilitate user management on Pi.
-
Using Raspberry Pi & OpenCV: Configuring Connectivity with Raspberry Pi
After watching this video, you will be able to demonstrate the steps and approaches of connecting with Raspberry Pi.
-
Using Raspberry Pi & OpenCV: Exercise: Working with Bluetooth and Wi-Fi Networks
After watching this video, you will be able to discover the SSID and key of a Wi-Fi network, launch a Bluetooth controller, and set a device to discoverable mode.
-
Raspi-config & GPIO: Identifying Input and Output Challenges
After watching this video, you will be able to identify the challenges of input output when working with Raspberry GPIO.
-
Raspi-config & GPIO: Exercise: Working with Raspi-configure
After watching this video, you will be able to create a user, use raspi-configure to enable the camera, and discover Wi-Fi connections on a network.
-
Arduino Language: Features and Benefits of Arduino
After watching this video, you will be able to illustrate the essential features and benefits of Arduino.
-
Arduino Language: Pin Ops in Arduino
After watching this video, you will be able to identify the essential pin ops in Arduino.
-
Arduino Language: Serial Communication in Arduino
After watching this video, you will be able to demonstrate how to facilitate serial communication in Arduino.
-
Arduino Language: Arduino Language Fundamentals
After watching this video, you will be able to illustrate the important coding elements of Arduino language.
-
Arduino Language: Arduino Language Programming
After watching this video, you will be able to demonstrate how to program IoT applications using the Arduino Language.
-
Arduino Language: Connect Arduino with Pi
After watching this video, you will be able to demonstrate how to connect Arduino with Raspberry Pi.
-
Arduino Language: Arduino IDE
After watching this video, you will be able to illustrate the various capabilities and usages of the Arduino IDE.
-
Arduino Language: Arduino Device Components
After watching this video, you will be able to demonstrate the various essential device components of Arduino.
-
Arduino Language: Install the Arduino IDE
After watching this video, you will be able to install the Arduino integrated development environment.
-
Principles of IoT & Python Basics: IoT Data Analytics
After watching this video, you will be able to recognize the impact that IoT has over data analytics .
-
Principles of IoT & Python Basics: IoT Applications and Paradigm Shift in IT
After watching this video, you will be able to illustrate how the arrival of IoT applications has had an impact on the IT industry.
-
Principles of IoT & Python Basics: Cloud for IoT Applications
After watching this video, you will be able to recognize the essential capabilities of IoT applications that can be implemented on the cloud.
-
Principles of IoT & Python Basics: IoT Ecosystem and Architecture
After watching this video, you will be able to recognize the architecture and ecosystem of IoT .
-
Principles of IoT & Python Basics: Characteristics of IoT Projects
After watching this video, you will be able to identify the essential characteristics of IoT projects.
-
Principles of IoT & Python Basics: Installing MicroPython
After watching this video, you will be able to install and configure MicroPython.
-
Principles of IoT & Python Basics: Exercise: Working with MicroPython
After watching this video, you will be able to launch MicroPython live simulator, use MicroPython code to turn the LED ON/OFF, and print messages.
-
Principles of IoT & Python Basics: Working with Online Python Simulator
After watching this video, you will be able to demonstrate how to work with Online Python Simulator using certain fundamental examples.
-
Principles of IoT & Python Basics: Critical MicroPython Features
After watching this video, you will be able to list the feature of MicroPython that can be implemented in IoT applications.
-
Principles of IoT & Python Basics: Impact of IoT
After watching this video, you will be able to describe the impact the invention of IoT products has had on the lives of consumers.
-
Principles of IoT & Python Basics: Python and IoT
After watching this video, you will be able to specify how IoT can be implemented using Python.
-
Exploring Machine Learning: What is Machine Learning?
After watching this video, you will be able to define machine learning and how it can be used to solve a variety of problems.
-
Exploring Machine Learning: Supervised Learning
After watching this video, you will be able to define supervised machine learning.
-
Working with SSML & AVS: Components of Custom Skills
After watching this video, you will be able to classify the various essential components of custom skills.
-
Working with SSML & AVS: Smart Home Skills API Features
After watching this video, you will be able to identify the various features provided by the Smart Home Skills API that can be used to manage home services.
-
Working with SSML & AVS: Set Up AVS SDK on Windows
After watching this video, you will be able to describe the steps involved in setting up the AVS SDK on Windows.
-
Working with SSML & AVS: Working with MediaPlayer
After watching this video, you will be able to demonstrate the steps involved in implementing MediaPlayer.
-
Working with SSML & AVS: AVS Services
After watching this video, you will be able to list the various AVS capabilities along with their implementation scenarios.
-
Working with SSML & AVS: AVS SDK Components
After watching this video, you will be able to identify the various SDK components available for AVS and illustrate their implementation.
-
Working with Smart Home & Business: Create Smart Home Skills Using the API
After watching this video, you will be able to demonstrate how we can create skills for Smart Home using APIs.
-
Working with Smart Home & Business: Smart Home Endpoint
After watching this video, you will be able to configure Smart Home endpoints and illustrate the approaches of testing skills.
-
Working with Smart Home & Business: Smart Home Attributes
After watching this video, you will be able to identify the essential and critical attributes of Smart Home.
-
Working with Smart Home & Business: Smart Home Supported Devices
After watching this video, you will be able to list the devices that support Smart Home, along with their limitations.
-
Working with SSML & AVS: Exercise: Work with SSML and Tags
After watching this video, you will be able to launch an existing skill, write SSML with emphasis tags, and provision pauses between the tags.
-
Working with Smart Home & Business: Best Practices for Managing Alexa
After watching this video, you will be able to describe the best practices that should be followed when managing Alexa.
-
Working with Smart Home & Business: Manage Skills Using Alexa for Business
After watching this video, you will be able to identify the essential approaches of managing skills using Alexa for Business.
-
Working with Smart Home & Business: Deploy Node.js Custom Skills
After watching this video, you will be able to demonstrate the steps involved in deploying Node.js custom skills.
-
Working with Smart Home & Business: Alexa Capabilities for Business APIs
After watching this video, you will be able to describe the capabilities provided by Alexa for Business .
-
Working with Smart Home & Business: Manage Shared Resources Using Alexa for Business
After watching this video, you will be able to list the essential approaches of using and managing shared resources with Alexa for Business.
-
Skill Development Using Alexa Components: Skill Development Process
After watching this video, you will be able to illustrate the steps involved in initiating, building, and deploying skills for Alexa.
-
Skill Development Using Alexa Components: Creating New Skills Using Developer Console
After watching this video, you will be able to demonstrate how to create new skills using the features and capabilities provided by the Alexa Skills Developer Console.
-
Skill Development Using Alexa Components: Video Skills and List Skills
After watching this video, you will be able to illustrate the essential features and capabilities of the Video Skill and List Skill.
-
Skill Development Using Alexa Components: Exercise: Work with Flash Briefing Skill
After watching this video, you will be able to log in to the Alexa Skills Developer Console and create and test a Flash Briefing Skill.
-
Skill Development Using Alexa Components: Smart Home Skill Features
After watching this video, you will be able to recall the essential Smart Home Skill features that can be implemented in Alexa.
-
Skill Development Using Alexa Components: Flash Briefing Skill
After watching this video, you will be able to work with the essential Flash Briefing Skill API features that we can implement in Alexa.
-
Skill Development Using Alexa Components: Skill Metrics
After watching this video, you will be able to demonstrate the various metrics of Alexa Skills.
-
Skill Development Using Alexa Components: Testing Alexa Skills
After watching this video, you will be able to work with the various testing approaches that we can use to test Alexa Skills.
-
Skill Development Using Alexa Components: Interaction Model in Alexa
After watching this video, you will be able to list the various Interaction models of Alexa.
-
Skill Development Using Alexa Components: Skill Store Metadata
After watching this video, you will be able to define and classify the Skill Store metadata along with the relevant structure.
-
Working with ASK API Using Node.js & Java: Java SDK for ASK API
After watching this video, you will be able to recall the various approaches of using Java SDK API to work with Alexa Skills.
-
Working with ASK API Using Node.js & Java: Configure ASK SDK
After watching this video, you will be able to demonstrate how to set up ASK SDK for Alexa Skill development.
-
Working with ASK API Using Node.js & Java: User Interaction Approach for Accessing Skills
After watching this video, you will be able to list the various user interaction approaches that can be used to access skills in Alexa.
-
Working with ASK API Using Node.js & Java: Exercise: Working with Java SDK & Node.js
After watching this video, you will be able to set up Java SDK for development, create a skill using Node.js ASK CLI, and launch the skill in an editor for customization.
-
Working with ASK API Using Node.js & Java: Configure and Construct Skill Instances
After watching this video, you will be able to create and configure Alexa Skill instances.
-
Working with ASK API Using Node.js & Java: Implement Node.js Audio Player
After watching this video, you will be able to implement Node.js audio player.
-
Working with ASK API Using Node.js & Java: Configure ASK SDK for Node.js
After watching this video, you will be able to configure ASK SDK for Node.js API.
-
Working with ASK API Using Node.js & Java: Develop Skills Using Node.js
After watching this video, you will be able to develop Alexa Skills using Node.js.
-
Working with ASK API Using Node.js & Java: Develop Skills and Manage Request Handlers in Java
After watching this video, you will be able to demonstrate how to develop Alexa Skills and implement request handlers using Java .
-
Working with ASK API Using Node.js & Java: Essential Skill Attributes
After watching this video, you will be able to describe the essential attributes that are associated with Alexa Skills.
-
Working with SSML & AVS: Using SSML Tags
After watching this video, you will be able to recall the various SSML tags along with their usages and implementations in Alexa Skill.
-
Working with SSML & AVS: Text Interpretation with Say-as
After watching this video, you will be able to describe the implementation of text interpretation using Say-as.
-
Working with SSML & AVS: SSML Capabilities
After watching this video, you will be able to describe the essential SSML capabilities along with their usage scenarios.
-
Working with SSML & AVS: SSML Markup Document Structure
After watching this video, you will be able to illustrate the typical document structure used with SSML markups.
-
Alexa Architecture & Components: Alexa Skills Kit
After watching this video, you will be able to list the essential features and scope of the Alexa Skills Kit.
-
Alexa Architecture & Components: Approach of Building Skills
After watching this video, you will be able to define the various approaches of building Alexa Skills in order to implement Alexa applications.
-
Alexa Architecture & Components: Capabilities of Alexa
After watching this video, you will be able to identify the various capabilities of Alexa and their relevance.
-
Alexa Architecture & Components: Technical Architecture of Alexa
After watching this video, you will be able to recall the technical architecture of Alexa along with the essential architectural components.
-
Alexa Architecture & Components: Skill Categories
After watching this video, you will be able to list the various categories of skills along with their respective features.
-
Alexa Architecture & Components: Exercise: Work with Lambda Using Alexa Skill
After watching this video, you will be able to create a lambda function, configure the Alexa Skill to launch Lambda, and launch the Alexa Developer dashboard.
-
Alexa Architecture & Components: Developer Account
After watching this video, you will be able to demonstrate the steps involved in creating an Amazon Developer account for skill development.
-
Alexa Architecture & Components: Developer Console
After watching this video, you will be able to illustrate the essential elements and components of the Amazon Developer Console.
-
Alexa Architecture & Components: Skill Models
After watching this video, you will be able to describe the various essential skill models of Alexa .
-
Alexa Architecture & Components: Lambda
After watching this video, you will be able to illustrate how we can use the Lambda service and it's utilities in Alexa.
-
Working with Smart Home & Business: Exercise: Creating a Skill with Node.js
After watching this video, you will be able to create a security profile, and create and deploy a skill with Node.js.
-
Exploring Machine Learning: Getting Started with scikit-learn
After watching this video, you will be able to import data, and perform basic tasks with scikit-learn for Python.
-
Exploring Machine Learning: Generating a Tree
After watching this video, you will be able to use scikit-learn and GraphViz to generate a decision tree model from a dataset.
-
Exploring Machine Learning: Introduction to AWS Machine Learning
After watching this video, you will be able to describe AWS machine learning.
-
Exploring Machine Learning: Creating a Model in AWS
After watching this video, you will be able to create a model with AWS.
-
Exploring Machine Learning: Regression Metrics in Python
After watching this video, you will be able to describe how to use Python to calculate common evaluation methods.
-
Exploring Machine Learning: Setting Up an AWS Environment for Machine Learning
After watching this video, you will be able to set up an AWS environment and import data sources.
-
Exploring Machine Learning: Anomaly Detection
After watching this video, you will be able to describe anomaly detection, the types of problems solved with anomaly detection, and some approaches to anomaly detection.
-
Exploring Machine Learning: K-means Clustering
After watching this video, you will be able to describe the k-means clustering algorithm.
-
Exploring Machine Learning: Training a Model and Making Predictions in AWS
After watching this video, you will be able to set training criteria with AWS and train a model.
-
Exploring Machine Learning: Dimensionality Reduction
After watching this video, you will be able to describe the problems with dimensionality and what efforts to reduce dimensionality should be taken.
-
Exploring Machine Learning: Principal Component Analysis
After watching this video, you will be able to describe principal component analysis for dimensionality reduction.
-
Exploring Machine Learning: Exercise: Describe Bias and Variance
After watching this video, you will be able to define bias, variance, and tradeoffs.
-
Exploring Machine Learning: Defining Neural Networks
After watching this video, you will be able to describe neural networks and their capabilities.
-
Exploring Machine Learning: Activation Functions
After watching this video, you will be able to describe activation functions and list different types of commonly used activation functions.
-
Exploring Machine Learning: Training Neural Networks
After watching this video, you will be able to describe feedforward neural networks and the intuition behind calculating gradients in neural networks.
-
Exploring Machine Learning: Neural Network Structures
After watching this video, you will be able to describe how different neural networks are structured.
-
Exploring Machine Learning: Cost Functions for Neural Networks
After watching this video, you will be able to describe how cost functions are used to train neural networks.
-
Exploring Machine Learning: Introducing TensorFlow
After watching this video, you will be able to describe TensorFlow and its high-level architecture.
-
Exploring Machine Learning: Training Neural Networks With Backpropagation
After watching this video, you will be able to describe how to use backpropagation for more efficient neural network training.
-
Exploring Machine Learning: Batch Learning
After watching this video, you will be able to describe batch learning and why it makes neural network training easier.
-
Exploring Machine Learning: CNN Architecture
After watching this video, you will be able to describe the high-level architecture of convolutional neural networks.
-
Exploring Machine Learning: Convolution Layers
After watching this video, you will be able to describe how convolution layers are set in convolutional neural networks.
-
Exploring Machine Learning: Introducing Convolutional Neural Networks (CNNs)
After watching this video, you will be able to describe convolutional neural networks, how they are different from regular neural networks, and how they are used.
-
Exploring Machine Learning: Regularization
After watching this video, you will be able to describe regularization and how it applies to convolutional neural networks.
-
Exploring Machine Learning: Pooling Layer
After watching this video, you will be able to describe how pooling layers work in convolutional neural networks.
-
Exploring Machine Learning: CNN Training Considerations
After watching this video, you will be able to describe some training considerations for convolutional neural networks and how training can differ from traditional neural networks.
-
Exploring Machine Learning: Introducing Recurrent Neural Networks (RNNs)
After watching this video, you will be able to describe recurrent neural networks, how they are different from regular neural networks, and how they are used.
-
Exploring Machine Learning: RNN Types
After watching this video, you will be able to describe different types of recurrent neural networks.
-
Exploring Machine Learning: Convolutional Neural Network Implementation
After watching this video, you will be able to describe implementing and training convolutional neural networks.
-
Exploring Machine Learning: Regularization Methods for CNNs
After watching this video, you will be able to describe regularization methods for convolutional neural networks.
-
Exploring Machine Learning: RNNs and LSTM for Language Modeling
After watching this video, you will be able to describe RNNs and LSTM for language modeling.
-
Exploring Machine Learning: Describe Convolutional Neural Networks
After watching this video, you will be able to describe convolutional neural networks, common uses, pooling layers, and LSTM.
-
Exploring Machine Learning: Long Short Term Memory (LSTMs) in TensorFlow
After watching this video, you will be able to describe LSTMs networks in TensorFlow.
-
Exploring Machine Learning: Bias and Variance
After watching this video, you will be able to describe the two main types of error in machine learning models and the tradeoff between them.
-
Exploring Machine Learning: Cross-validation
After watching this video, you will be able to describe how to use cross-validation to show how generalized a model is.
-
Exploring Machine Learning: Cross-validation in Python
After watching this video, you will be able to describe cross-validation in Python to obtain strong evaluation scores.
-
Exploring Machine Learning: Classification Metrics in Python
After watching this video, you will be able to describe common evaluation metrics for evaluating classification models.
-
Exploring Machine Learning: Metrics for Regression Models
After watching this video, you will be able to describe different metrics that can be used to evaluate regression models.
-
Exploring Machine Learning: Metrics for Binary Classification Models
After watching this video, you will be able to describe different metrics that can be used to evaluate binary classification models.
-
Exploring Machine Learning: Metrics for Non-binary Classification Models
After watching this video, you will be able to describe different metrics that can be used to evaluate non-binary classification models.
-
Exploring Machine Learning: How to Build Models
After watching this video, you will be able to describe the fundamentals of building machine learning models to solve a problem.
-
Exploring Machine Learning: Overfitting
After watching this video, you will be able to describe overfitting, how it can be a problem, and how to mitigate it.
-
Exploring Machine Learning: Gradient Descent Optimization Algorithm
After watching this video, you will be able to describe the gradient descent algorithm for training linear regression models.
-
Exploring Machine Learning: k-Nearest Neighbor (kNN)
After watching this video, you will be able to describe the k-nearest neighbor model and how to learn it.
-
Exploring Machine Learning: Precision and Recall
After watching this video, you will be able to evaluate machine learning models and compare them.
-
Exploring Machine Learning: Linear Regression Model
After watching this video, you will be able to define the linear regression model for one and multiple variable problems.
-
Exploring Machine Learning: Linear Model and Gradient Descent with scikit-learn
After watching this video, you will be able to use SciKit Learn to fit a linear regression model to a dataset.
-
Exploring Machine Learning: k-Nearest Neighbor with scikit-learn
After watching this video, you will be able to use SciKit Learn's k-nearest neighbor model.
-
Exploring Machine Learning: Decision Tree Learning
After watching this video, you will be able to describe decision tree models and how to learn decision trees using the C4.5 algorithm.
-
Exploring Machine Learning: Introducing scikit-learn for ML in Python
After watching this video, you will be able to setup SciKit Learn for Python.
-
Exploring Machine Learning: Precision and Recall with scikit-learn
After watching this video, you will be able to use SciKit Learn to calculate the precision and the recall of different machine learning models in Python.
-
Exploring Machine Learning: Exercise: Fit a Linear Regression Model
After watching this video, you will be able to implement a linear regression model and Python and fit it to a dataset.
-
Exploring Machine Learning: Decision Tree Learning with scikit-learn
After watching this video, you will be able to use SciKit Learn to fit a decision tree model to a dataset.
-
Exploring Machine Learning: CART Decision Tree Learning
After watching this video, you will be able to describe the CART decision tree learning algorithm and how it's different from C4.5.
-
Exploring Machine Learning: Random Forests
After watching this video, you will be able to describe the random forests machine learning.
-
Exploring Machine Learning: Classification vs. Regression
After watching this video, you will be able to describe the difference between classification and regression models and the use for each of them.
-
Exploring Machine Learning: Regression Trees
After watching this video, you will be able to describe how decision trees can be applied to regression problems.
-
Exploring Machine Learning: Random Forests with Python
After watching this video, you will be able to use SciKit Learn to build a random forest model in Python.
-
Exploring Machine Learning: Logistic Regression Model
After watching this video, you will be able to describe the logistic regression model.
-
Exploring Machine Learning: Kernel Methods for SVMs
After watching this video, you will be able to describe how to use kernel methods with support vector machines to model more complex data.
-
Exploring Machine Learning: Support Vector Machines in Python
After watching this video, you will be able to use SciKit Learn to train and support vector machines in Python.
-
Exploring Machine Learning: Logistic Regression in Python
After watching this video, you will be able to use SciKit Learn to fit a logistic regression model.
-
Exploring Machine Learning: Support Vector Machines (SVM)
After watching this video, you will be able to describe support vector machine models.
-
Exploring Machine Learning: Exercise: Supervised Learning in Python
After watching this video, you will be able to describe different supervised learning models in Python.
-
Exploring Machine Learning: What is Unsupervised Learning?
After watching this video, you will be able to describe unsupervised learning and some of the problems it can solve.
-
Exploring Machine Learning: Naïve Bayes Classifiers
After watching this video, you will be able to describe the Naïve Bayes classifiers and how to train them.
-
Exploring Machine Learning: Naïve Bayes Classifiers in Python
After watching this video, you will be able to use SciKit Learn to fit a Naive Bayes classifier in Python.
-
Exploring Machine Learning: Rule Association
After watching this video, you will be able to describe rule association and how the Apriori algorithm performs this task.
-
Exploring Machine Learning: Clustering
After watching this video, you will be able to describe clustering and the types of problems it applies to.
-
Exploring Virtual Reality: Use Menus in a VR Environment
After watching this video, you will be able to describe the ways in which menus can be used effectively in a VR environment.
-
Exploring Virtual Reality: Setting Up a Blink Transition
After watching this video, you will be able to set up a blink transition that can be used in favor of player movement.
-
Exploring Virtual Reality: Creating a Curved 3D Menu for a VR App
After watching this video, you will be able to use the different types of user interfaces to create a curved 3D menu for a VR app.
-
Exploring Virtual Reality: Creating a Simple Context Menu for a VR App
After watching this video, you will be able to create a menu that can come into focus as the user targets an object or placeholder.
-
Exploring Virtual Reality: Using a Diegetic UI
After watching this video, you will be able to create and use a diegetic UI to display data to a user.
-
Exploring Virtual Reality: Working with a Spatial UI
After watching this video, you will be able to create and use a spatial UI to display data to a user.
-
Exploring Virtual Reality: Creating a Nondiegetic UI
After watching this video, you will be able to create and use a nondiegetic Ui to display data to a user.
-
Exploring Virtual Reality: Using Anti-aliasing with Fonts
After watching this video, you will be able to use anti-aliasing and adjust the sharpness of text.
-
Exploring Virtual Reality: Using 3D Text
After watching this video, you will be able to render 3D text within a VR environment.
-
Exploring Virtual Reality: Working with UI Interactions in a VR Environment
After watching this video, you will be able to describe the limitations of UI interfaces in VR and the possible solutions.
-
Exploring Virtual Reality: Manipulate the VR Environment
After watching this video, you will be able to describe how manipulating a virtual reality environment can affect a user.
-
Exploring Virtual Reality: Using a Touchpad or Keyboard
After watching this video, you will be able to use a touchpad, keyboard, control stick, or headgear buttons to allow users to manipulate a virtual reality environment.
-
Exploring Virtual Reality: Managing Rotation and Position
After watching this video, you will be able to use head rotation and position tracking in a virtual reality environment.
-
Exploring Virtual Reality: Working with the Render Scale
After watching this video, you will be able to work with the render scale to find a balance between sharpness and performance.
-
Exploring Virtual Reality: Defining the use of a Reticle
After watching this video, you will be able to define what a reticle is and how it can be used to help a user within a virtual reality environment.
-
Exploring Virtual Reality: Detecting and Using Gaze
After watching this video, you will be able to describe how gaze is used and how it affects a VR environment.
-
Exploring Virtual Reality: Recognizing and Preventing Vection
After watching this video, you will be able to interact with a user's sense of motion and recognize how it affects virtual reality experiences.
-
Exploring Virtual Reality: Preventing Nausea
After watching this video, you will be able to prevent nausea and give the user a comfortable virtual environment experience.
-
Exploring Virtual Reality: Defining How VR Causes Nausea
After watching this video, you will be able to specify how virtual reality environments can cause nausea and other discomforts for users.
-
Exploring Virtual Reality: Defining VR Sickness
After watching this video, you will be able to describe the symptoms of virtual reality sickness and the contributing factors.
-
Exploring Virtual Reality: Using VR in Development
After watching this video, you will be able to describe VR, the types of VR, and the available development tools.
-
Exploring Virtual Reality: Identifying Hardware and Software Requirements
After watching this video, you will be able to identify the hardware and software requirements for developing virtual reality applications with Unity.
-
Exploring Virtual Reality: Distinguishing Development Based on C++ vs C#
After watching this video, you will be able to distinguish and describe the differences between programming virtual reality games and applications with C++ vs C#.
-
Exploring Virtual Reality: Describing the Development Tools for Virtual Reality
After watching this video, you will be able to describe the tools and environments that exist for developing virtual reality games and applications.
-
Exploring Virtual Reality: Comparing Virtual Reality Headgear
After watching this video, you will be able to compare some of the features and capabilities of current virtual reality headgear.
-
Exploring Virtual Reality: Defining the Types of Virtual Reality
After watching this video, you will be able to define the types of virtual reality and when they could be used.
-
Exploring Virtual Reality: Describing Virtual Reality
After watching this video, you will be able to describe virtual reality, the importance of virtual reality, and the future of virtual reality.
-
Exploring Virtual Reality: Describing Virtual Reality Hardware
After watching this video, you will be able to describe the types of virtual reality hardware and their capabilities or limits.
-
Exploring Virtual Reality: Defining Immersion in Virtual Reality
After watching this video, you will be able to define the levels of immersion and how it affects a user in virtual reality.
-
Exploring Virtual Reality: Identifying Where Virtual Reality Can Be Applied
After watching this video, you will be able to identify where virtual reality is already being used or could be used in the near future.
-
Exploring Virtual Reality: Describing the History of Virtual Reality
After watching this video, you will be able to describe the beginning of virtual reality and how it has reached the point it is at today.
-
Exploring Virtual Reality: Creating a New Project in Unreal
After watching this video, you will be able to create a new Blueprint-based project in Unreal Engine.
-
Exploring Virtual Reality: Setting Up Unreal for Android Development
After watching this video, you will be able to configure Unreal Engine for developing Android apps.
-
Exploring Virtual Reality: Use Google VR and Unreal
After watching this video, you will be able to set up gaze-based interaction.
-
Exploring Virtual Reality: Configuring Build Settings for Android
After watching this video, you will be able to configure Unreal Engine settings to be able to build a VR project for Android.
-
Exploring Virtual Reality: Debugging a Line Trace
After watching this video, you will be able to use Unreal tools to debug a line trace.
-
Exploring Virtual Reality: Implementing Hit Testing
After watching this video, you will be able to implement gaze-based interaction by hit testing based on a line trace.
-
Exploring Virtual Reality: Setting Up a Line Trace
After watching this video, you will be able to modify a Blueprint to add a line trace for gaze-based interaction.
-
Exploring Virtual Reality: Creating a Blueprint-based Pawn
After watching this video, you will be able to create a pawn that represents a user's VR viewpoint.
-
Exploring Virtual Reality: Configuring Unreal Project Settings for GoogleVR
After watching this video, you will be able to modify Unreal Engine project settings to facilitate GoogleVR development.
-
Exploring Virtual Reality: Installing Unreal Engine
After watching this video, you will be able to describe how to install Unreal Engine on a development machine.
-
Exploring Virtual Reality: Optimizing VR for Unity
After watching this video, you will be able to describe why optimization is required for VR apps and describe some of the techniques that can be used.
-
Exploring Virtual Reality: Adjusting the Level of Detail Setting
After watching this video, you will be able to adjust the Level of Detail (LOD) setting to reduce the number of rendered triangles as objects get farther away.
-
Exploring Virtual Reality: Managing the View Quality
After watching this video, you will be able to use the built-in Quality Settings to balance the visual quality versus performance of the app.
-
Exploring Virtual Reality: Using Shaders
After watching this video, you will be able to use shaders only where appropriate to increase performance.
-
Exploring Virtual Reality: Configuring Lightmapping
After watching this video, you will be able to eliminate or reduce the lighting requirements to increase performance.
-
Exploring Virtual Reality: Using Draw Call Batching
After watching this video, you will be able to use Draw Call batching to batch draw calls to improve performance.
-
Exploring Virtual Reality: Working with Occlusion
After watching this video, you will be able to use occlusion culling to prevent rendering of objects that are not visible.
-
Exploring Virtual Reality: Working with Overdraw
After watching this video, you will be able to find objects that are being overdrawn and remove them to reduce wasting GPU time.
-
Exploring Virtual Reality: Working with Geometry
After watching this video, you will be able to optimize the drawing of objects by removing faces of any object that will not be seen.
-
Exploring Virtual Reality: Using the Frame Debugger
After watching this video, you will be able to use the Unity Frame Debugger to investigate rendering issues and find objects that don't need to be rendered.
-
Exploring Virtual Reality: Using the Unity Profiler
After watching this video, you will be able to use the Unity profiler to find areas that need optimization.
-
Exploring Virtual Reality: The Role of Optimization in VR Apps
After watching this video, you will be able to describe why optimization is fundamental for a user to have a good VR experience.
-
Secure Programming: CAS Configuration
After watching this video, you will be able to configure Code Access Security in a .NET application.
-
Secure Programming: Link Demands and CAS
After watching this video, you will be able to identify the relationship between link demands and CAS.
-
Secure Programming: Using Hash Codes for Data Integrity in .NET
After watching this video, you will be able to specify how to use hash codes in a .NET application.
-
Secure Programming: Encrypting and Decrypting Data in .NET
After watching this video, you will be able to recognize the process for encrypting and decrypting data.
-
Secure Programming: Using Keys for Encryption in .NET
After watching this video, you will be able to configure data encryption using keys.
-
Secure Programming: The .NET Cryptography Model
After watching this video, you will be able to recognize the main features of the .NET cryptography model.
-
Secure Programming: Windows Authentication in .NET
After watching this video, you will be able to configure an ASP.NET application for Windows authentication.
-
Secure Programming: Securing ASP.NET Web Forms
After watching this video, you will be able to create secure ASP.NET web forms.
-
Secure Programming: Security Tools for .NET
After watching this video, you will be able to list and describe common security tools to be used with .NET.
-
Secure Programming: Common Threats to .NET
After watching this video, you will be able to identify common threats to .NET applications.
-
Secure Programming: Creating a Secure .NET Application
After watching this video, you will be able to use secure coding techniques to create a .NET application.
-
Secure Programming: References and Pointers
After watching this video, you will be able to identify the best way to use references and pointers and why you should avoid raw pointers.
-
Secure Programming: Functions in C/C++
After watching this video, you will be able to recognize how to keep functions focused and concise.
-
Secure Programming: Working with Loops
After watching this video, you will be able to describe why for-loops are preferred to while-loops.
-
Secure Programming: Authentication in .NET
After watching this video, you will be able to describe how authentication works in .NET.
-
Secure Programming: .NET Framework Security
After watching this video, you will be able to identify the key features of security in the .NET framework.
-
Secure Programming: Creating a Secure C/C++ Application
After watching this video, you will be able to use defensive coding techniques to create a secure C/C++ application.
-
Secure Programming: Code Readability
After watching this video, you will be able to recognize the importance of good readability for planning and maintaining code.
-
Secure Programming: Microsoft Security Development Lifecycle (SDL)
After watching this video, you will be able to define what the Microsoft Security Development Lifecycle (SDL) is.
-
Secure Programming: .NET Security Namespaces
After watching this video, you will be able to list and describe the key .NET security namespaces.
-
Secure Programming: Secure Coding in .NET
After watching this video, you will be able to recognize the key features of secure coding in the .NET Framework.
-
Secure Programming: GenericPrincipal and GenericIdentity Objects
After watching this video, you will be able to compare GenericPrincipal and GenericIdentity objects.
-
Secure Programming: Replacing Principal Objects
After watching this video, you will be able to recognize the purpose of replacing Principal objects.
-
Secure Programming: Working with the WindowsPrincipal Object
After watching this video, you will be able to demonstrate how to use the WindowsPrincipal object in .NET.
-
Secure Programming: Permissions and Role-based Security
After watching this video, you will be able to describe how role-based security and permissions are used in .NET.
-
Secure Programming: ASP.NET Code Access Security (CAS)
After watching this video, you will be able to recognize the main features of CAS.
-
Secure Programming: .NET Security Fundamentals
After watching this video, you will be able to identify key features of .NET application security and how security is implemented.
-
Secure Programming: Claims-based Security
After watching this video, you will be able to describe claims-based security
-
Secure Programming: Impersonation in .NET
After watching this video, you will be able to describe how impersonation works in .NET.
-
Secure Programming: Working with Partially Trusted Code in .NET
After watching this video, you will be able to configure your .NET application to use partially trusted code.
-
Secure Programming: Security-transparent Code in .NET
After watching this video, you will be able to demonstrate how to use transparency as an enforcement mechanism.
-
Secure Programming: Potential Risk Sources
After watching this video, you will be able to identify sources of risk that can negatively impact your software applications.
-
Secure Programming: Introducing Secure Programming
After watching this video, you will be able to describe secure programming, its relationship to defensive programming, and its benefits and disadvantages.
-
Secure Programming: Introducing Defensive Programming
After watching this video, you will be able to describe defensive programming and identify its benefits and disadvantages.
-
Secure Programming: Introduction to Unit Testing
After watching this video, you will be able to describe what unit testing is and the benefits it provides.
-
Secure Programming: Introduction to Testing
After watching this video, you will be able to describe why testing should be performed and identify the major phases of the software testing process.
-
Secure Programming: Initiating Defensive Programming
After watching this video, you will be able to describe how to include defensive programming techniques into your software development process.
-
Secure Programming: Secure Coding Practices
After watching this video, you will be able to describe best practices for creating secure code.
-
Secure Programming: Employing Iterative Design
After watching this video, you will be able to identify the key features of iterative design.
-
Secure Programming: Writing Clean Code
After watching this video, you will be able to recognize what clean code is and the best techniques for writing clean code.
-
Secure Programming: Program Securely
After watching this video, you will be able to identify the benefits of employing defensive and secure programming and recognize the phases of the software testing process.
-
Secure Programming: Writing Testable Code
After watching this video, you will be able to recognize how to write testable C/C++ code.
-
Secure Programming: Employing Pre and Post Conditions
After watching this video, you will be able to apply pre and post conditions to C/C++ code.
-
Secure Programming: Working with Assertions
After watching this video, you will be able to use assertions in your programming code.
-
Secure Programming: Using Pseudo-code
After watching this video, you will be able to use pseudo-code to develop programming solutions.
-
Secure Programming: If and Switch Statements
After watching this video, you will be able to identify how to use if and switch statements in creating defendable code.
-
Secure Programming: Variable Declarations
After watching this video, you will be able to recognize how to implement variable declarations for defendable code.
-
Secure Programming: Method Parameters and Return Values
After watching this video, you will be able to identify how to apply defensive techniques for method parameters and return values.
-
Secure Programming: Writing Defensible Methods
After watching this video, you will be able to create examples of defensible methods.
-
Secure Programming: C/C++ Error Codes and Messages
After watching this video, you will be able to create a C/C++ application that incorporates error codes and messages into its error handling.
-
Secure Programming: Utilizing Exceptions
After watching this video, you will be able to demonstrate how to use exceptions to handle errors.
-
Secure Programming: Error Processing and Global Objects
After watching this video, you will be able to recognize how to use error processing and global objects in your programs.
-
Secure Programming: Identifying Potential UI Application Risks
After watching this video, you will be able to identify potential risks to C/C++ UI applications.
-
Secure Programming: Create Clean and Testable Code
After watching this video, you will be able to use defensive coding techniques to create clean, testable methods.
-
Secure Programming: Anticipating Errors
After watching this video, you will be able to recognize how to anticipate potential errors in C/C++ code.
-
Secure Programming: Handling Errors Locally
After watching this video, you will be able to identify how to handle errors locally in C/C++ code.
-
Secure Programming: Preventing Formatted String Attacks
After watching this video, you will be able to identify how to prevent formatted string vulnerabilities.
-
Secure Programming: Dealing with Code Injection Attacks
After watching this video, you will be able to describe what code injection attacks are and how to mitigate them in C/C++ applications.
-
Secure Programming: Preventing Buffer Overflows
After watching this video, you will be able to identify how to prevent buffer overflows in C/C++ applications.
-
Secure Programming: Understanding Buffer Overflows in Applications
After watching this video, you will be able to describe what buffer overflows are and how to limit their impact.
-
Secure Programming: Preventing DLL Hijacking
After watching this video, you will be able to recognize how to prevent DLL hijacking in C/C++ applications.
-
Secure Programming: Dealing with Bad Data
After watching this video, you will be able to specify how to handle bad data in your C/C++ applications.
-
Secure Programming: Using Exceptions
After watching this video, you will be able to use exceptions in C/C++ applications.
-
Secure Programming: Working with Data
After watching this video, you will be able to recognize how to properly interface with data in C/C++.
-
Secure Programming: Creating Code for Safe User Input
After watching this video, you will be able to use defensive coding techniques to handle user input.
-
Secure Programming: Constraining User Input
After watching this video, you will be able to recognize how to constrain user input to prevent the inputting of bad data.
-
Secure Programming: Using Regular Expressions
After watching this video, you will be able to work with regular expressions to help with input validation.
-
Secure Programming: Working with Accessor Methods
After watching this video, you will be able to identify the correct way to access internal class data.
-
Secure Programming: Operator Overloading
After watching this video, you will be able to recognize how to properly use operator overloading in C/C++.
-
Secure Programming: Casting
After watching this video, you will be able to identify why casting in the C++ style is preferred to the C style.
-
Secure Programming: Data Validation
After watching this video, you will be able to demonstrate some common data validation techniques employed to create secure C/C++ applications.
-
Microservices: Jenkins CI
After watching this video, you will be able to describe the Jenkins interface using the Maven plugin.
-
Microservices: Introduction to Continuous Integration
After watching this video, you will be able to define continuous integration and how its mapped to microservices.
-
Microservices: Look into REST Constraints
After watching this video, you will be able to define various common REST constraints.
-
Microservices: Introducing Microservices and REST
After watching this video, you will be able to recognize concepts in REST and HTTP architecture.
-
Microservices: Spring Boot Auto Configurations
After watching this video, you will be able to define various springboot auto configurations.
-
Microservices: Bootstrapping with Spring Boot
After watching this video, you will be able to define spring building with Maven and Gradle.
-
Microservices: Installing Spring Boot
After watching this video, you will be able to describe how to install Springboot.
-
Microservices: Introducing Spring Boot
After watching this video, you will be able to define Springboot and its use with microservices.
-
Microservices: Microservice Service Discovery
After watching this video, you will be able to recognize the use of service discovery and its benefits.
-
Microservices: Deployment Strategies
After watching this video, you will be able to describe various deployment implementations.
-
Microservices: Exercise: Deployment Architecture and REST
After watching this video, you will be able to recognize deployment architecture and RESTful services.
-
Microservices: Understanding Microservice Deployment
After watching this video, you will be able to identify best practices in microservice deployment.
-
Microservices: Connecting Applications and Services
After watching this video, you will be able to describe processes in connecting applications with services.
-
Microservices: Kubernetes Services
After watching this video, you will be able to identify Kubernetes services.
-
Microservices: Kubernetes Cluster Administration
After watching this video, you will be able to configure a Kubernetes cluster.
-
Microservices: Dockerfile
After watching this video, you will be able to define Dockerfiles and how the tool is used to build and automate actions.
-
Microservices: Using Containers
After watching this video, you will be able to recognize how to use containers with microservices.
-
Microservices: Introduction to Containers
After watching this video, you will be able to define containers in microservices.
-
Microservices: Using the Docker Toolbox
After watching this video, you will be able to identify the docker GUI and toolbox.
-
Microservices: Installing Docker
After watching this video, you will be able to install and configure Docker.
-
Microservices: Why Use Docker with Microservices?
After watching this video, you will be able to describe the benefits of using Docker with Microservices.
-
Microservices: Exercise: Microservice Concepts with Docker
After watching this video, you will be able to recognize how to use Docker with microservices.
-
Microservices: Deploying Microservices in Docker
After watching this video, you will be able to create a process using Docker to automate several processes.
-
Microservices: Test Database Server in Docker
After watching this video, you will be able to use docker to create a test database server.
-
Microservices: Service to Service
After watching this video, you will be able to describe service to service authentication and authorization.
-
Microservices: Fine Grain Authorization
After watching this video, you will be able to describe the process of fine grain authorization.
-
Microservices: Microservices Authentication and Authorization
After watching this video, you will be able to describe the processes of authentication and authorization.
-
Microservices: Microservices General Security Considerations
After watching this video, you will be able to recognize general security practices with microservices.
-
Microservices: Metric Tracking
After watching this video, you will be able to recognize the process of metric tracking across a span of servers.
-
Microservices: Log Management
After watching this video, you will be able to define log management and concepts applied to microservices.
-
Microservices: Microservices Logging Tools
After watching this video, you will be able to recognize various microservices logging tools.
-
Microservices: Monitoring Several Servers
After watching this video, you will be able to describe the process of monitoring several servers.
-
Microservices: Monitoring a Server with Services
After watching this video, you will be able to describe the process of monitoring a single server.
-
Microservices: Microservices Monitoring Tools
After watching this video, you will be able to define various microservices monitoring tools.
-
Microservices: Test and Scale Microservices
After watching this video, you will be able to recognize the process of testing and scaling microservices end to end.
-
Microservices: Autoscaling Microservices
After watching this video, you will be able to define autoscaling and how it's used.
-
Microservices: Caching Microservices
After watching this video, you will be able to recognize the process of caching microservices.
-
Microservices: Scaling Microservices Databases
After watching this video, you will be able to describe the process of scaling microservices databases.
-
Microservices: Microservices Scaling Introduction
After watching this video, you will be able to define microservices scaling and the various methods.
-
Microservices: Service Test Implementation
After watching this video, you will be able to describe the process in implementing service tests.
-
Microservices: Performance and Cross-functional Testing
After watching this video, you will be able to recognize the use of performance and cross-functional testing.
-
Microservices: Test Scope
After watching this video, you will be able to define the scope of testing end to end.
-
Microservices: Microservices Testing
After watching this video, you will be able to define the various microservices tests including unit and service testing.
-
Microservices: Continuous Integration vs. Continuous Delivery
After watching this video, you will be able to recognize the differences between continuous integration and continuous delivery.
-
Microservices: Best Practices in Continuous Delivery
After watching this video, you will be able to describe various best practices for designing continuous delivery pipelines.
-
Microservices: Continuous Testing
After watching this video, you will be able to list benefits of continues and performance testing.
-
Microservices: Integration Testing
After watching this video, you will be able to recognize the process of testing continuous integration.
-
Microservices: Build Docker Containers for Jenkins
After watching this video, you will be able to describe the process of building and composing containers for the Jenkins UI.
-
Microservices: Modular System vs. Services
After watching this video, you will be able to compare the differences between using modules and services.
-
Microservices: Dependencies
After watching this video, you will be able to define dependencies in microservices.
-
Microservices: Continuous Deployment and Delivery with SOA
After watching this video, you will be able to recognize SOA concepts with DevOps and continuous deployment and delivery.
-
Microservices: Other Microservice Design Patterns
After watching this video, you will be able to describe various design patterns for microservice-based architectures.
-
Microservices: Command Query Responsibility Segregation (CQRS)
After watching this video, you will be able to describe the Command Query Responsibility Segregation and how to implement queries in a microservice architecture.
-
Microservices: Introduction to Docker
After watching this video, you will be able to define docker and describe its components and relation to the microservice architecture.
-
Microservices: Inter-process Communication (IPC)
After watching this video, you will be able to recognize concepts in building IPC.
-
Microservices: Introduction to Microservice Communication
After watching this video, you will be able to define the various communication processes including Direct Client-to-Microservices communication and API Gateway.
-
Microservices: Cohesion and Coupling
After watching this video, you will be able to compare the importance of cohesion and coupling microservices.
-
Microservices: Event Sourcing
After watching this video, you will be able to describe the process of event-driven architecture with event sourcing.
-
Microservices: Exercise: Name Aspects of Microservice Architecture
After watching this video, you will be able to recognize the various approaches to microservice architecture from past to present.
-
Microservices: SOA Early Approaches
After watching this video, you will be able to recognize early approaches including EAI and CORBA and SOAP.
-
Microservices: Microservice and Implementation of SOA
After watching this video, you will be able to distinguish concepts in implementations of SOA.
-
Microservices: Benefits of Service Oriented Architecture (SOA)
After watching this video, you will be able to recognize the benefits and costs of SOA.
-
Microservices: The Monolithic Approach
After watching this video, you will be able to define the monolithic approach and the differences of using monolithic over SOA.
-
Microservices: Early Variations of Microservices
After watching this video, you will be able to identify various early versions of microservices.
-
Microservices: Designing Microservices
After watching this video, you will be able to demonstrate microservices from use cases.
-
Microservices: System Design and Operations
After watching this video, you will be able to recognize various microservice processes.
-
Microservices: Introduction to Microservice Architecture
After watching this video, you will be able to distinguish the architecture behind microservices.
-
Exploring Microservices: Advantages of Microservices
After watching this video, you will be able to identify microservices and its advantages.
-
Exploring Microservices: Defining Microservices
After watching this video, you will be able to define a service and its purpose in a service oriented architecture (SOA).
-
Exploring Virtual Reality: Deploying to Android
After watching this video, you will be able to deploy a GoogleVR app from Unreal to a connected Android device.
-
Clean Coding Techniques: Introduction to Testing
After watching this video, you will be able to describe testing and why it's important in clean coding.
-
Clean Coding Techniques: Command Query Model
After watching this video, you will be able to recognize characteristics of the Command Query model.
-
Clean Coding Techniques: Describe Architecture and Testable Code
After watching this video, you will be able to describe software architecture and testable code and how they are related to clean coding.
-
Clean Coding Techniques: Automated Unit Testing in .NET
After watching this video, you will be able to demonstrate how to create automated unit testing in .NET projects.
-
Clean Coding Techniques: Testing Practices for Clean Coding
After watching this video, you will be able to recognize different testing practices that enhance the clean coding paradigm.
-
Clean Coding Techniques: Making the Clean Coding Commitment
After watching this video, you will be able to specify how your commitment to clean coding can improve your final products.
-
Clean Coding Techniques: Benefits of CQRS
After watching this video, you will be able to list the benefits of CQRS and why it promotes clean coding.
-
Clean Coding Techniques: CQRS and Event Sourcing
After watching this video, you will be able to specify how Command Query Responsibility Segregation (CQRS) and event sourcing play a role in clean coding.
-
Clean Coding Techniques: CQRS and DDD
After watching this video, you will be able to describe Command Query Responsibility Segregation (CQRS) and how it complements domain-driven design (DDD) in application development.
-
Clean Coding Techniques: Screaming Architecture
After watching this video, you will be able to describe screaming architecture and its relevance in clean coding.
-
Clean Coding Techniques: Estimating Time Frames
After watching this video, you will be able to specify how to estimate time frames and ensure that they don't interfere with a commitment to clean coding.
-
Clean Coding Techniques: Good Architecture
After watching this video, you will be able to recognize how good architecture is envisioned through adoption of the screaming architecture paradigm.
-
Clean Coding Techniques: Types of Testing
After watching this video, you will be able to specify common types of testing and how clean coding fits into them.
-
Clean Coding Techniques: Clean Microservices Architecture
After watching this video, you will be able to describe the clean microservice architecture and how it relates to clean coding development.
-
Clean Coding Techniques: Creating Code
After watching this video, you will be able to describe how code creation should be approached in the clean coding process.
-
Clean Coding Techniques: Planning and Designing
After watching this video, you will be able to describe how clean coding plays a role in software planning and design.
-
Clean Coding Techniques: Describe CQRS and Implementation
After watching this video, you will be able to describe CQRS and factors relating to implementation.
-
Clean Coding Techniques: Evolving Your Applications
After watching this video, you will be able to identify how your clean coding process can improve upon existing products, as your applications evolve.
-
Clean Coding Techniques: Consistent Code
After watching this video, you will be able to specify how code can be better by being made consistent.
-
Clean Coding Techniques: Understandable Code
After watching this video, you will be able to define why code should be made understandable.
-
Clean Coding Techniques: Simple Code
After watching this video, you will be able to describe the fundamental principle of creating simple code.
-
Clean Coding Techniques: Benefits of Clean Coding
After watching this video, you will be able to define the benefits of adopting clean coding.
-
Clean Coding Techniques: The Importance of Functionality
After watching this video, you will be able to define the importance of better code functionality.
-
Clean Coding Techniques: The Importance of Readability
After watching this video, you will be able to specify the importance of code readability.
-
Clean Coding Techniques: Don't Repeat Yourself (DRY)
After watching this video, you will be able to describe the principle of DRY and why it's important.
-
Clean Coding Techniques: Maintainable Code
After watching this video, you will be able to define the importance and benefits of maintainable code.
-
Clean Coding Techniques: Project Organization
After watching this video, you will be able to define the benefits and best practices for organizing project files.
-
Clean Coding Techniques: The Importance of Security
After watching this video, you will be able to describe the importance of better code security.
-
Clean Coding Techniques: Teamwork and Clean Coding
After watching this video, you will be able to specify the benefits and best practices for team organization and clean coding.
-
Clean Coding Techniques: Defensive Programming Techniques
After watching this video, you will be able to specify techniques used in defensive programming.
-
Clean Coding Techniques: Introduction to Defensive Programming
After watching this video, you will be able to define defensive programming and its basic philosophy.
-
Clean Coding Techniques: Demonstrate Clean Coding Basics
After watching this video, you will be able to demonstrate usage of different naming conventions, commenting, and syntax.
-
Clean Coding Techniques: Policies and Procedures
After watching this video, you will be able to describe how policies and procedures can be implemented for better clean coding.
-
Clean Coding Techniques: Introduction to Model-view-controller (MVC)
After watching this video, you will be able to define MVC and how it relates to clean coding.
-
Clean Coding Techniques: Reusing Intelligent Source Code (ISC)
After watching this video, you will be able to specify how and why ISC can be reused.
-
Clean Coding Techniques: Offensive Programming
After watching this video, you will be able to describe offensive programming and how it relates to defensive programming.
-
Clean Coding Techniques: Secure Programming
After watching this video, you will be able to describe secure programming and how it relates to defensive programming.
-
Clean Coding Techniques: The Purpose of Model-view-controller (MVC)
After watching this video, you will be able to describe the purpose of MVC.
-
Clean Coding Techniques: Pros and Cons of Model-view-controller (MVC)
After watching this video, you will be able to list the pros and cons of MVC.
-
Clean Coding Techniques: Implementing Model-view-controller (MVC)
After watching this video, you will be able to specify how MVC can be implemented.
-
Clean Coding Techniques: How Domain-driven Design (DDD) Works
After watching this video, you will be able to define the process of DDD.
-
Clean Coding Techniques: What Is Domain-driven Design (DDD)?
After watching this video, you will be able to describe DDD and how it relates to clean coding.
-
Clean Coding Techniques: Model-view-controller (MVC) Frameworks
After watching this video, you will be able to describe the availability of MVC frameworks for different languages.
-
Clean Coding Techniques: Model-view-controller (MVC) and Web Development
After watching this video, you will be able to describe how the MVC paradigm is illustrated by traditional web design.
-
Clean Coding Techniques: Introduction to the Single Responsibility Principle
After watching this video, you will be able to define the Single Responsibility Principle and how it fits in the SOLID model.
-
Clean Coding Techniques: What Is SOLID?
After watching this video, you will be able to describe the SOLID model and its five principles.
-
Clean Coding Techniques: Describe Defensive Programming and MVC
After watching this video, you will be able to describe defensive programming and MVC and how they contribute to clean coding.
-
Clean Coding Techniques: Pros and Cons of Domain-driven Design (DDD)
After watching this video, you will be able to describe pros and cons of implementing DDD.
-
Clean Coding Techniques: Open/Closed Principle Techniques
After watching this video, you will be able to specify techniques used in the Open/Closed Principle.
-
Clean Coding Techniques: Introduction to the Open/Closed Principle
After watching this video, you will be able to describe the Open/Closed Principle and how it fits in the SOLID model.
-
Clean Coding Techniques: Single Responsibility Principle Techniques
After watching this video, you will be able to describe techniques used with the Single Responsibility Principle.
-
Clean Coding Techniques: Interface Segregation Principle Techniques
After watching this video, you will be able to specify techniques used in the Interface Segregation Principle.
-
Clean Coding Techniques: Introducing Interface Segregation Principle (ISP)
After watching this video, you will be able to define the Interface Segregation Principle and how it fits in the SOLID model.
-
Clean Coding Techniques: Liskov Substitution Principle (LSP) Techniques
After watching this video, you will be able to specify techniques used in the LSP.
-
Clean Coding Techniques: Introducing the Liskov Substitution Principle (LSP)
After watching this video, you will be able to define the LSP and how it fits in the SOLID model.
-
Clean Coding Techniques: Describe the SOLID Model
After watching this video, you will be able to describe the SOLID model and its five principles.
-
Clean Coding Techniques: Dependency Inversion Principle (DIP) Techniques
After watching this video, you will be able to specify techniques used in the DIP.
-
Clean Coding Techniques: Introducing the Dependency Inversion Principle (DIP)
After watching this video, you will be able to define the DIP and how it fits in the SOLID model.
-
Clean Coding Techniques: Why Clean Coding Is Important
After watching this video, you will be able to specify the reasons why clean coding is important.
-
Clean Coding Techniques: Clean Coding Overview
After watching this video, you will be able to describe the basic goals of clean coding.
-
Clean Coding Techniques: Introduction to Functions
After watching this video, you will be able to describe functions and how they should be implemented in clean coding.
-
Clean Coding Techniques: Function Arguments
After watching this video, you will be able to specify function arguments and how they should be implemented in clean coding.
-
Clean Coding Techniques: Function Naming
After watching this video, you will be able to discuss function naming and how it should be implemented in clean coding.
-
Clean Coding Techniques: Levels of Abstraction
After watching this video, you will be able to identify levels of abstraction and how they should be implemented in clean coding.
-
Clean Coding Techniques: Global Functions
After watching this video, you will be able to describe global functions and how they should be implemented in clean coding.
-
Clean Coding Techniques: Conditionals
After watching this video, you will be able to discuss function conditionals and how they should be implemented in clean coding.
-
Clean Coding Techniques: Parameters and Subdivision
After watching this video, you will be able to define function parameters and why functions should be subdivided in clean coding.
-
Clean Coding Techniques: Side Effects
After watching this video, you will be able to list side effects that can be experienced when using functions and recognize how they can be avoided.
-
Clean Coding Techniques: Type Checking
After watching this video, you will be able to specify type checking and how it relates to clean coding.
-
Clean Coding Techniques: Exception Handling Techniques
After watching this video, you will be able to recall exception handling techniques and how they improve code.
-
Clean Coding Techniques: The Importance of Exception Handling
After watching this video, you will be able to describe the importance of exception handling and how it should be utilized in clean coding.
-
Clean Coding Techniques: Multi-tier Development Architectures
After watching this video, you will be able to list the various multi-tier software development architectural models and how they can promote clean coding.
-
Clean Coding Techniques: Describe Functions and Testing
After watching this video, you will be able to describe clean coding best practices.
-
Clean Coding Techniques: Names and Language
After watching this video, you will be able to describe best practices for naming, namespaces, objects, and functions.
-
Clean Coding Techniques: Domain-centric Architecture
After watching this video, you will be able to describe domain-centric architecture and its purpose.
-
Clean Coding Techniques: MVP vs. MVC
After watching this video, you will be able to describe the differences and similarities between the MVP and MVC paradigms in application development.
-
Clean Coding Techniques: Model-view-presenter (MVP)
After watching this video, you will be able to describe the MVP paradigm in application development.
-
Clean Coding Techniques: Why Layers Matter
After watching this video, you will be able to recognize the importance of layers in application development.
-
Clean Coding Techniques: Pros and Cons of Domain Architecture
After watching this video, you will be able to specify the pros and cons of using a domain architectural model in application development.
-
Clean Coding Techniques: Types of Domain-centric Architecture
After watching this video, you will be able to specify various types of domain-centric architectural models in application development.
-
Clean Coding Techniques: Why Domain-centric Architecture?
After watching this video, you will be able to list the reasons why domain-centric architecture is an important part of clean coding in application development.
-
Microservices: Service Discovery Patterns
After watching this video, you will be able to describe various service discovery patterns.
-
Exploring AI: Describe Q-learning
After watching this video, you will be able to describe Q-learning and how to set up the algorithm for a particular problem.
-
Exploring AI: Introducing Natural Language Processing (NLP)
After watching this video, you will be able to define NLP, and list some of its applications and methods.
-
Exploring AI: Deep Q-learning
After watching this video, you will be able to describe how deep neural networks can be used to approximate q-value for given states in Q-learning.
-
Exploring AI: Function Approximation
After watching this video, you will be able to describe why lookup tables aren't ideal for most reinforced learning tasks and how to build some function approximations that can make these problems possible.
-
Exploring AI: Off-policy and On-policy Learning
After watching this video, you will be able to describe on-policy and off-policy learning and the difference between the two.
-
Exploring AI: Implementing Q-learning
After watching this video, you will be able to describe the different parts used in Q-learning and how these can be implemented.
-
Exploring AI: Defining Q-learning
After watching this video, you will be able to define Q-learning for reinforced learning.
-
Exploring AI: Exploration and Exploitation Policies
After watching this video, you will be able to describe exploration and exploitation in the context of active reinforced learning and describe some of the exploration policies used in learning algorithms.
-
Exploring AI: Active Learning
After watching this video, you will be able to describe active learning and contrast it with passive learning.
-
Exploring AI: Temporal Difference Learning
After watching this video, you will be able to describe temporal difference learning and contrast it with direct utility estimation.
-
Exploring AI: Direct Utility Estimation
After watching this video, you will be able to describe how to use direct utility estimation for passive learning and how to define the Bellman Equation in the context of reinforced learning.
-
Exploring AI: Passive Learning
After watching this video, you will be able to describe passive learning.
-
Exploring AI: Additive and Discounted Rewards
After watching this video, you will be able to describe additive rewards and discounted rewards.
-
Exploring AI: What Is Reinforcement Learning?
After watching this video, you will be able to describe reinforcement learning and list some of the techniques that agents can use to learn.
-
Exploring AI: Make a Perceptron Learn From Examples
After watching this video, you will be able to describe how a perceptron can learn how to achieve a particular result given a set of examples.
-
Exploring AI: Variable Ordering
After watching this video, you will be able to describe how to order variables when performing a backtracking search.
-
Exploring AI: Backtracking Search
After watching this video, you will be able to describe how to use a backtracking search to solve a constraint satisfaction problem.
-
Exploring AI: Constraint Satisfaction Problem Examples
After watching this video, you will be able to list some examples of problems that are better for constraint satisfaction algorithms than search algorithms.
-
Exploring AI: Recurrent Neural Networks
After watching this video, you will be able to describe recurrent neural networks.
-
Exploring AI: Convolutional Neural Networks
After watching this video, you will be able to describe convolutional neural networks.
-
Exploring AI: Deep Neural Networks
After watching this video, you will be able to describe how perceptron learning can be generalized to a multilayered neural network.
-
Exploring AI: Perceptron Learning
After watching this video, you will be able to describe how machine learning works with a perceptron.
-
Exploring AI: Types of Neural Networks
After watching this video, you will be able to list some of the common types of neural networks and what problems they might be good at solving.
-
Exploring AI: Neural Network Structure
After watching this video, you will be able to describe the structure of a neural network and its individual neurons.
-
Exploring AI: Artificial Neural Networks
After watching this video, you will be able to describe neural networks and how they apply to artificial intelligence.
-
Exploring AI: Overfitting
After watching this video, you will be able to describe overfitting and how decision tree models can be made to mitigate this issue.
-
Exploring AI: Decision Tree Learning: Choosing Attributes
After watching this video, you will be able to describe how to choose attributes to learn a decision tree.
-
Exploring AI: Decision Tree Learning: Information Gain
After watching this video, you will be able to describe entropy and information gain for learning decision tree models.
-
Exploring AI: Using Decision Trees
After watching this video, you will be able to describe decision trees and how the model expresses knowledge.
-
Exploring AI: Learning From Examples
After watching this video, you will be able to describe how examples can be used for learning.
-
Exploring AI: Describe the Markov Decision Process
After watching this video, you will be able to describe the Markov Decision Process and how it can be used by an intelligent agent.
-
Exploring AI: Applying POMDPs
After watching this video, you will be able to describe how a partially observable Markov Decision Process can be implemented with an intelligent agent.
-
Exploring AI: POMDP Value Iteration
After watching this video, you will be able to describe how the value iteration algorithm is used with the partially observable Markov Decision Process.
-
Exploring AI: Partially Observable Markov Decision Process (POMDP)
After watching this video, you will be able to define the partially observable Markov Decision Process and contrast it with a regular Markov Decision Process.
-
Exploring AI: MDP Value Iteration
After watching this video, you will be able to describe the value iteration algorithm to decide on an optimal policy for a Markov Decision Process.
-
Exploring AI: Markov Decision Process
After watching this video, you will be able to define the Markov Decision Process and how it applies to AI.
-
Exploring AI: Markov Chains
After watching this video, you will be able to define Markov chains.
-
Exploring AI: Value of Information
After watching this video, you will be able to describe the utility of information gain and how information gain can influence decisions.
-
Exploring AI: Utility and Risks
After watching this video, you will be able to describe how risks are taken into consideration when calculating utility and how attitude for risks can change the utility function.
-
Exploring AI: Utility and Preferences
After watching this video, you will be able to describe how preferences are involved in decision making and how the same problem can have different utility functions with different agents.
-
Exploring AI: Utility Theory
After watching this video, you will be able to describe utility theory and how an agent can calculate expected utility of decisions.
-
Exploring AI: Uncertainty Representation
After watching this video, you will be able to describe how probability theory is used to represent knowledge to help an intelligent make decisions.
-
Exploring AI: What Is Uncertainty?
After watching this video, you will be able to describe uncertainty and how it applies to AI.
-
Exploring AI: Solving a Sudoku Puzzle
After watching this video, you will be able to describe how to represent a Sudoku puzzle and how to solve it as a constraint satisfaction problem.
-
Exploring AI: Using a Local Search for CSPs
After watching this video, you will be able to describe how local search algorithms can be used to solve constraint satisfaction problems.
-
Exploring AI: Using Inference with Search
After watching this video, you will be able to describe how to use the backjumping and forward checking inference method in a backtracking search.
-
Exploring AI: Constraint Propagation
After watching this video, you will be able to describe how to use arc consistency to solve a constraint satisfaction problem with constraint propagation.
-
Exploring AI: Arc Consistency
After watching this video, you will be able to describe arc consistency and other types of constraint consistency in a constraint satisfaction problem.
-
Exploring AI: Making Good Heuristics
After watching this video, you will be able to describe how to create a good heuristic function for a given search problem.
-
Exploring AI: Heuristics
After watching this video, you will be able to define heuristics and their various properties.
-
Exploring AI: Greedy Best-first Search
After watching this video, you will be able to describe the greedy approach for best-first informed searching.
-
Exploring AI: Iterative Deepening Search
After watching this video, you will be able to describe depth-limited search and the iterative deepening search algorithms.
-
Exploring AI: Depth-first Search
After watching this video, you will be able to describe the depth-first search algorithm.
-
Exploring AI: What Are Constraint Satisfaction Problems (CSPs)?
After watching this video, you will be able to define constraint satisfaction problems and describe how they are different from search problems.
-
Exploring AI: Simulated Annealing
After watching this video, you will be able to describe the simulated annealing search algorithm and how it improves on hill-climbing search.
-
Exploring AI: Hill-climbing Search
After watching this video, you will be able to describe local searching and the hill-climbing search algorithm.
-
Exploring AI: A* Search
After watching this video, you will be able to describe the A* search algorithm.
-
Exploring AI: Certainty in an Environment
After watching this video, you will be able to define deterministic and stochastic environments and how the level of certainty in an environment affects agents.
-
Exploring AI: Number of Agents in Environments
After watching this video, you will be able to describe how the number of agents in a given environment can affect an agent.
-
Exploring AI: Environment's Observability
After watching this video, you will be able to distinguish between an observable, a partially observable, and an unobservable environment, and describe how these affect agents.
-
Exploring AI: Describing Environments
After watching this video, you will be able to define the task environment that intelligent agents live in.
-
Exploring AI: Environment's Behavior
After watching this video, you will be able to describe the different types of environmental behavior and how this can affect agents.
-
Exploring AI: Types of Agents
After watching this video, you will be able to describe the different types of intelligent agents.
-
Exploring AI: Defining Agents
After watching this video, you will be able to define intelligent agents.
-
Exploring AI: AI Techniques
After watching this video, you will be able to list some of the techniques used to build artificial intelligence systems.
-
Exploring AI: Fields and Applications
After watching this video, you will be able to describe some of the fields in artificial intelligence research and their applications.
-
Exploring AI: What Is Artificial Intelligence?
After watching this video, you will be able to describe the four main definitions of artificial intelligence.