TED Talks
TED: The difference between false empathy and true support | Chezare A. Warren
There's a right way and wrong way to do empathy, says author and scholar Chezare A. Warren. So how do we get it right? He unpacks the source of false empathy and explains the key shift in perspective we need to build healthy...
MinuteEarth
Should We Contact Uncontacted Peoples
FYI: We try to leave jargon out of our videos, but if you want to learn more about this topic, here are some handy keywords to get your googling started: - isolated peoples: peoples living without significant contact with global...
SciShow
Why We Started Shooting Lasers Into People’s Eyeballs
Your eyes might malfunction, but lasers can fix them. Here's how researchers developed those procedures.
SciShow
Why Does Squinting Help You See Better?
If you've ever tried to make out something that was really far away, odds are you squinted while doing it. It's basically involuntary! But does narrowing your field of vision really help you see things better?
TED-Ed
TED-Ed: How does laser eye surgery work? | Dan Reinstein
In 1948, Spanish ophthalmologist Jose Ignacio Barraquer Moner was fed up with glasses. He wanted a solution for blurry vision that fixed the eye itself, without relying on external aids. The surgery he eventually devised was called...
TED-Ed
TED-Ed: Networking for the networking averse - Lisa Green Chau
Networking can seem so hard -- but not if you have the right advice. Try taking advantage of weak ties; you never know what friend of a friend of a friend can aid you in your dreams. Lisa Green Chau outlines how being proactive and...
Be Smart
Why Don't Other Animals Wear Glasses?
Vision impairment is common in humans, so why not the rest of the animal kingdom?
SciShow
What Happens If You Leave Your Contacts in for Too Long?
If you're wearing contacts, you might want to take a look at this.
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Mobile Security" of the series "The Absolute Beginners Guide to...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Curated Video
The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - How to Secure Your LinkedIn Account
In this video, you will discover effective strategies to enhance the security of your LinkedIn account, ensuring its protection and safeguarding your personal information. This clip is from the chapter "Social Media Security and Email...
Curated Video
CompTIA A+ Certification Core 1 (220-1101) - Mobile Synchronization
Synchronization keeps data up to date on each of your mobile devices and other connected devices. This episode explores syncing to the desktop, automobile, cloud, and more. This clip is from the chapter "Book Chapter 25 - Maintaining and...
Curated Video
Evolution of Mobile Phones: From Wireless Telephones to Lifestyle Devices
The video explores the evolution of mobile phone technology, from the earliest wireless telephone invented by Nathan Stubblefield in 1902 to modern advancements like biometric security features and fitness tracking capabilities. It...
Curated Video
ChatGPT for Salesforce Development - Use ChatGPT to Write Batch Apex Class
In this video, we will begin using ChatGPT to learn more about Batch Apex and its capabilities. We will then create a Batch Apex class that appends “Mytutorialrack” to all contact names and ask the ChatGPT to write the corresponding test...
Curated Video
ChatGPT for Salesforce Development - How to Use ChatGPT to Write Flows for You?
In this video, we will work on an example where we will ask ChatGPT to create a Salesforce flow that deletes related contacts whenever its associated account is deleted. You will see firsthand how ChatGPT can be used to simplify the...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Packt
Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Packt
Checking Default App Permissions - Android
This video talks about the kinds of permissions the applications have on an Android device. We will look at app permissions such as Instagram, Rebtel, and introduce to you an app to manage the permissions quickly and effectively. This...
Curated Video
MAC OS: MAC OS Focus Mode
Learner will understand how to block notifications and set various limits when working on various tasks
Organizational Communication Channel
Group Attraction: 3 Reasons Certain Groups Attract Us
Group Attraction explains why we join certain groups and not others. This video looks at the top three reasons we are attracted to groups.
Hip Hughes History
The USA Freedom Act Explained: US History Review
My Social Studies teacher look at how the USA Freedom Act changes the USA Patriot Act. Plus you get to learn what a backronym is.
Curated Video
Hack an Android Phone
In this video, you will learn how to hack into an android phone by deploying a malicious application. Gain total control over the mobile phone and manage it through Armitage on KALI.
Curated Video
Hack an Android Phone with Armitage
In this video, we will actually hack an Android phone by deploying our payload using Armitage, which is a GUI for metasploit framework.