Feed aggregator

Search Google Scholar

or browse databases: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #

You are here

Search

Research

Services

Libraries & Spaces

About

Information for:

Introduction to 3D

Lynda.com - Sun, 06/12/2016 - 20:00
Authored By: George Maestri

Released On: 9/10/2015

No matter what software you use or final product you create, all 3D modeling and rendering packages share the same underlying concepts. In this course, expert George Maestri provides a broad overview of these concepts and the techniques that apply to all types of 3D artwork: character designs, product shots, animation, visual effects, and more. He starts with navigating 3D space and manipulating existing objects, reviews geometry and modeling, and shows how to apply color and texture to surfaces. Finally, George goes over basic rendering theory, covering features found in most commercial rendering engines.


Intermediate Google AdWords

Lynda.com - Sun, 06/12/2016 - 20:00
Authored By: Martin Shervington

Released On: 6/13/2016

Take your AdWords campaigns beyond the basics. Go deeper into AdWords settings and get more value for your ad spend. Intermediate Google AdWords provides loads of new hints and tips on how to run your account and maximize conversions—whether you're running ads directly on Google, connecting to a local audience, or remarketing to people who've already visited your site. Learn how to use advanced settings to find better keywords, optimize campaigns, identify trending topics, test landing pages, create dynamic ads, and much more. Along the way, author Martin Shervington recaps terms such as impressions, CTR, Quality Score, and CPA, so you can refresh your knowledge and your vocabulary while you learn new techniques.


Recruiting Veterans

Lynda.com - Sun, 06/12/2016 - 20:00
Authored By: Lida Citroën

Released On: 6/13/2016

With roughly 200,000 men and women transitioning out of the military each year, veterans are a rich source of talent to tap. Through their military training, veterans learn the importance of strong leadership and connecting jobs to mission and values. In this course, veteran recruiting expert Lida Citroën helps recruiters identify and appreciate the differences between post-9/11 veteran and civilian candidates, as well as the qualities, skills, and talents veterans offer to employers. She also addresses questions on building your company brand to be attractive to veterans. What appeals to veteran candidates and what turns them off? Where should companies spend money and resources? How do you identify the military skills you want to attract?

Last, Lida discusses ways to adapt your hiring process, teams, and systems to accommodate veteran employees, emphasizing onboarding and retention of veteran candidates.


Flickr Mobile: Photo Sharing Anywhere

Lynda.com - Sun, 06/12/2016 - 20:00
Authored By: Derrick Story

Released On: 6/13/2016

Enjoy photography and photo sharing from anywhere with the new Flickr app. Learn to use the mobile version of Flickr to shoot and enhance photos, share them, and explore photos taken by other community members. The app is available for iOS and Android and offers the same great features as the Flickr website, in a compact form you can take on the go. Photographer and educator Derrick Story walks through its best features, including the free storage, robust community, and online photo editing tools and filters. He helps you get your account up and running, adjust important privacy settings, start adding photos, and find and interact with friends. Plus, learn how to use Flickr to back up your photo libraries, so you never lose a shot.


How to Make Accessible Learning

Lynda.com - Sun, 06/12/2016 - 20:00
Authored By: Oliver Schinkten

Released On: 6/13/2016

Do all students have equal access to the learning resources and opportunities in your classroom? Learn to provide accommodations to make learning accessible to students with disabilities and meet Section 508 compliance for digital learning. In this course, Oliver Schinkten explores how to modify your classroom and online instruction to accommodate students with special needs. Find out about the different types of disabilities and challenges students may face, and learn how to use assistive technologies such as screen readers and closed captioning, incorporate visual and auditory cues into teaching, and encourage students to seek the learning supports that will help them succeed.


Learn Music Memos: The Basics

Lynda.com - Thu, 06/09/2016 - 20:00
Authored By: Matt Piper

Released On: 6/10/2016

Music Memos is a super cool tool for recording high-quality audio on your iPhone or iPad. In this course, author Matt Piper demonstrates how to effectively use Music Memos to record, arrange, edit, and share your musical ideas. He starts by covering automatic and manual recording techniques and how to review, rename, tag, and rate your musical ideas. Then he shows how to add drums and bass, trim the recordings, and add text notes, tuning, and capo positions. Finally, Matt explains how to share the musical ideas via email, iTunes, YouTube, and SoundCloud, and how to transfer the files to GarageBand or Logic Pro.


Neil Blumenthal on Branding

Lynda.com - Thu, 06/09/2016 - 20:00
Authored By: Neil Blumenthal

Released On: 6/10/2016

Think about your favorite brand. What's their story? What do they do? What do they stand for? In six short years, Warby Parker has defined itself as one of the most successful new American brands. Here, LinkedIn Influencer Neil Blumenthal shares his perspective on branding, and building companies and products in a brand-centric manner. He explains how he and cofounder and co-CEO, Dave Gilboa, run a company whose story and values play into everything from design and marketing to managing customer relationships and hiring talent.


S.O.L.I.D. Programming Principles

Lynda.com - Thu, 06/09/2016 - 20:00
Authored By: Steven Lott

Released On: 6/10/2016

There are many principles that support good object-oriented design and programming. Five of these principles are described by SOLID: single responsibility, open-closed, Liskov substitution, interface segregation, and dependency inversion. These principles guide the creation of stable, scalable, and robust code.

To incorporate SOLID into your own development workflow, Steven Lott has prepared a series of lessons that break down the principles one by one, with real-world examples. Learn how to use these principles in the design process, and to test the strength of your code along the way. Steven uses Python to demonstrate the concepts, but they're useful for any object-oriented programming language.


Build a Raspberry Pi Media Server

Lynda.com - Thu, 06/09/2016 - 20:00
Authored By: Brad Wheeler

Released On: 6/10/2016

The most popular use of Raspberry Pi is for custom media servers. All you need is a Pi that has access to your entertainment system and a copy of OSMC, an open-source media center "built for the people, by the people." In these tutorials, Brad Wheeler shows how to download, install, and configure OSMC to run on Raspberry Pi and set it up to play content from local and remote sources, as well as third-party services like YouTube. He also shows how to control your media server using a USB keyboard, the Chorus web UI, or an infrared (IR) remote and an IR sensor connected to your Raspberry Pi's GPIO.

Note: These instructions work with the Raspberry Pi 1, 2, and 3 models. OSMC does not support Netflix, Hulu, or HBO Go.


Ethical Hacking: Denial of Service

Lynda.com - Thu, 06/09/2016 - 20:00
Authored By: Malcolm Shore

Released On: 6/10/2016

Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are one of the biggest threats out there. Being able to mitigate DoS attacks is one of the most desired skills for any IT security professional—and a key topic on the Certified Ethical Hacker exam. Watch this course to learn what exactly a DoS attack is and the types of techniques hackers use to cripple wired and wireless networks, applications, and services on the infrastructure, such as FTP and SIP. Learn how attackers are using botnet-driven distributed DoS (DDoS) attacks to overwhelm defenses. Author and IT security expert Malcolm Shore also explores the rising threat of ransomware like CryptoLocker, and mitigation techniques for detecting and defeating DoS attacks.

Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. This course maps to the 09 Denial of Service domain.


Pages