Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

YouTube
Watch the continuation of a line boring and bore welding process on a Caterpillar 730 Articulated Dump Truck A-frame with a worn eye. Observe the use of a Sir Meccanica WS2 portable machine for bore welding, line boring, and surface finishing. Follow the step-by-step repair process, including cleaning, welding, machining to specifications, drilling retaining plate bolt holes, and cryo freeze shrink fitting a new bushing using liquid nitrogen. Conclude with the application of Caterpillar yellow paint, preparing the repaired A-frame for immediate reinstallation.

YouTube
Watch a 42-minute video demonstrating line boring and bore welding techniques to repair a Caterpillar 789 Dump Truck rear strut suspension rod using a Sir Meccanica WS2 portable machine. Learn the step-by-step process of grinding out bearing material, setting up the line boring machine, bore welding to build up new material, and boring to spec. Observe the facing, chamfer cutting, and snap ring groove creation, as well as the drilling of grease port holes. See the final steps of surface cleaning and press fitting a new bearing using a hydraulic press. Gain insights into using various tools, including a WIA 500i Weldmatic welder and an HMP-150T Hydraulic press, in this comprehensive repair demonstration by Cutting Edge Engineering Australia.

YouTube
Explore an alternative kernel dump capturing mechanism called Firmware-Assisted Dump in this 43-minute conference talk from the Linux Plumbers Conference. Delve into the technical aspects of this kdump alternative as presented by BATHINI Hari, gaining insights into its implementation, advantages, and potential applications in Linux kernel development and system debugging.

YouTube
Explore the evolution of kernel dump file formats and their unified handling in this 29-minute conference talk from the Linux Plumbers Conference. Delve into the world of live debugging and post-mortem analysis tools, focusing on the libkdumpfile library's role in accessing underlying data and metadata. Discover the challenges and opportunities in making libkdumpfile a potential replacement for current implementations in makedumpfile and crash. Gain insights into the kernel dump file format ecosystem and learn about the ongoing efforts to streamline and improve these critical debugging tools for Linux systems.

YouTube
Explore the latest advancements in kdump dump tools during this 45-minute conference talk at the Linux Plumbers Conference. Delve into Philipp Rudo's insights on modernizing these essential tools, gaining valuable knowledge about the latest developments in Linux kernel debugging and crash analysis techniques. Learn how these improvements enhance system reliability and troubleshooting capabilities for developers working at various levels of the Linux plumbing layer and beyond.
Pluralsight
When troubleshooting software, you either know precisely what the problem is, or you don't know anything at all. As programs become smarter and faster, troubleshooting with precision is becoming more and more challenging. In this course, Analyzing Java Thread Dumps, you will learn foundational knowledge of analyzing Java thread dumps and gain the skills required for tackling complex issues with confidence. First, you will learn how to read a thread dump, and how a thread dump is structured. Next, you will discover just how indispensable thread dumps are when you need to dig deeper into an issue, and how they can consistently put you ahead of the problem. Finally, you will see how to gather valuable, thread-oriented analytics from the operating system itself using tools such as "top", "strace", "lsof", and more. When you’re finished with this course, you will have the skills and knowledge needed to troubleshoot the most complex software issues that come your way.

YouTube
Explore a compelling conference keynote that delves into the challenges faced by truck drivers in the modern technological landscape. Discover how productivity monitoring, surveillance, and automation are reshaping the trucking industry, and learn about the pioneering research of ACM FAccT scholar Karen Levy. Gain insights into the future workplace as exemplified by the trucking sector, where various devices track everything from road hours to eye movements. Examine the historical structural labor issues, including sexual harassment and gender violence affecting female truck drivers, as well as the ongoing impact of Big Tech. Listen to truck driver Desiree Wood's inspiring journey of empowering female drivers to find their voice and dignity, and her collaboration with advocacy groups like Upturn to address and mitigate Big Tech-related harms in the industry.

YouTube
Learn how to optimize Linux core dumps for embedded IoT devices through this 38-minute conference talk from the Linux Foundation. Explore the challenges of processing core dumps in constrained environments with limited storage, bandwidth, and connectivity, and discover innovative solutions implemented in Rust. Examine the ELF structure and its application to core dumps, then dive into on-device optimization techniques that reduce core dump size by capturing only essential stack data. Understand privacy-preserving debugging methods using a custom Rust-built on-device stack unwinder that hooks into the core handler, converting coredumps to sets of program counters per frame to save space and prevent potential personally identifiable information leakage. Gain insights from real-world experience parsing millions of core dumps with Rust, learning practical lessons for scaling embedded debugging solutions in IoT environments.

YouTube
Watch a 27-minute conference talk exploring why developer platform consoles should maintain simplicity and minimal logic in their user interfaces. Learn from Viktor Farcic of Upbound as he critiques common mistakes in developer portal UI design, emphasizing how many platforms deviate from the proven principle that effective UIs should be "dumb" and API-dependent. Discover why good user interfaces should rely on APIs to determine available actions and required information, rather than implementing complex internal logic or bypassing API functionality. Examine the counterproductive trend of developer portals creating unnecessary complexity and using internal APIs instead of leveraging existing API capabilities.

YouTube
Discover the profound connection between childhood stressors and adult behaviors in this insightful 13-minute TEDx talk. Explore the concept of "Demons & Drivers" and learn how to harness the power of your past experiences to fuel your life's purpose. Gain valuable insights into transforming personal challenges into catalysts for growth and success. Uncover strategies for identifying and leveraging your defining driver to overcome obstacles and achieve your goals. This thought-provoking presentation offers a unique perspective on personal development and empowerment, encouraging viewers to embrace their inner demons and channel them towards positive change.

YouTube
Explore the minicoredumper project, a powerful tool designed to make core dumps viable for embedded systems with limited storage space. Learn how this set of userspace tools extends the Linux core dump facility, allowing fine-grained control over crash data capture. Discover how to reduce application core dumps to as little as 4KB, making them practical for embedded systems. Gain insights into the project's inner workings and see real-world scenarios demonstrating its application in embedded systems. Understand how the minicoredumper overcomes the challenges of limited read-write space in production environments, enabling detailed inspection of stack traces and data contents during crash investigations.

YouTube
Explore a critical security analysis of the Smart Sheriff parental control app in this BruCON conference talk. Delve into the findings of Abraham Aranguren and Fabian Fässler as they uncover significant vulnerabilities and design flaws in the application. Learn about the potential risks associated with using such software, including privacy concerns and security weaknesses that could be exploited by malicious actors. Gain insights into the importance of thorough security testing for applications designed to protect children, and understand the broader implications for parental control software development and implementation.

YouTube
Dive into an enlightening 45-minute conference talk that revolutionizes the way you approach hexadecimal data. Explore innovative techniques and strategies to streamline your work with hex, making it more intuitive and efficient. Gain valuable insights on transforming complex hexadecimal information into easily understandable formats, enhancing your ability to analyze and manipulate data effectively. Learn how to leverage advanced tools and methodologies to simplify hex-related tasks, ultimately saving time and reducing errors in your projects.

YouTube
Learn to create a cute stylized ice cream truck in Blender with this 30-minute tutorial from Polygon Runway. Follow along to master 3D modeling techniques for stylized vehicles while developing essential Blender skills. Download the free scene file from Gumroad or access the Blender scene file through Patreon. The tutorial includes instructions for installing the useful Isocam addon to enhance your workflow. Perfect for beginners looking to improve their 3D modeling and rendering skills while creating an adorable low-poly vehicle design.

YouTube
Learn about the Driver Risk Scores (DRS) threat detection system in this conference talk from BSidesCharm 2024. Explore how to assess and quantify the security risks posed by device drivers through a comprehensive scoring system based on seven critical characteristics. Discover how this scoring methodology, comparable to CVE scoring, combines security features and real-world data to generate actionable insights for system administrators and security teams. Drawing from research at loldrivers.io, understand the varying levels of driver vulnerabilities and learn to make informed decisions about driver deployment in your environment. Presented by Dana Behling, a cybersecurity researcher at Carbon Black, who brings both technical expertise in digital security and a creative approach influenced by her passion for science fiction and fantasy literature.

YouTube
Explore the intricacies of analyzing NXP i.MX architecture flash memory in this conference talk from the Hack In The Box Security Conference. Delve into the challenges of recovering filesystems from i.MX6 device memory dumps and learn about the custom flash memory management specific to this platform. Discover the speaker's journey in developing tools to parse and analyze i.MX6 flash memory dumps, enabling the extraction of complete filesystems for security assessment. Gain insights into the i.MX architecture, its flash memory layouts, and unique features such as spare area usage, block storage mechanisms, and partition variations. Learn how to extract valuable information from these memory dumps and explore the newly developed open-source tools presented for handling this specific memory layout.

YouTube
Explore strategies for managing compromised passwords in this 21-minute conference talk from BSidesLV's PasswordsCon. Learn how to respond effectively when malware operators dump passwords containing your company's accounts, despite strong password policies and awareness campaigns. Discover the origins of password dumps, proper handling procedures, and the potential benefits and pitfalls of dealing with compromised credentials. Gain valuable insights from speaker Susan Paskey on renewing hope and maintaining security after a password breach, ensuring your organization can recover and strengthen its defenses against future incidents.

YouTube
Explore two new features for IBM Secure Execution (SE) on Linux in this 25-minute conference talk by Steffen Eiden and Marc Hartmayer from IBM Deutschland Research & Development GmbH. Learn about attestation, which adds another layer of trust to confidential computing on IBM Z by allowing third-party verification of guest security and specific machine identification. Discover the confidential dump feature, which enables encrypted external VM dumping for cases where internal dumping fails or is unavailable. Understand the use cases, current state, and challenges of guest vs. hypervisor-initiated guest dumping. Gain insights into the QEMU/KVM perspective on dumping, the feature's life cycle, and relevant command lines. Delve into how these features enhance SE's usability and security in the context of IBM® Secure Execution technology.

YouTube
Explore the intricacies of the Truck Backer-Upper problem in this comprehensive lecture by Alfredo Canziani. Delve into state transition equations, vehicle configurations, and implementation in Jupyter Notebook. Learn about the two-stage learning process for training, including emulator training strategies and control as RNN. Discover unrolling in time (BPTT) techniques and examine successful controller trajectories. Gain insights into PyTorch implementation, Bayesian neural networks, dropout, and uncertainty in regression models. This in-depth session covers both theoretical concepts and practical demonstrations, providing a thorough understanding of advanced machine learning applications in vehicle control systems.

YouTube
Learn how to create a captivating low-poly truck animation in Blender with this 21-minute tutorial. Explore advanced 3D modeling techniques, animation workflows, and rendering tricks to bring your illustrations to life. Gain insights into creating dynamic scenes, applying textures, and setting up lighting for optimal visual impact. Download the provided scene files to follow along and enhance your skills in 3D animation and low-poly illustration. Perfect for both beginners and intermediate Blender users looking to expand their creative toolkit and produce eye-catching animated content.