Hi, what do you want to do?
Curated Video
MongoDB Mastering MongoDB for Beginners (Theory and Projects) - SQL Schema
In this video, we will take a quick overview of SQL Schema.
<
br/>
This clip is from the chapter "Overview" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will look at the course...
<
br/>
This clip is from the chapter "Overview" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will look at the course...
Curated Video
MongoDB Mastering MongoDB for Beginners (Theory and Projects) - NoSQL Schema
In this video, we will understand NoSQL Schema.
<
br/>
This clip is from the chapter "Overview" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will look at the course overview and...
<
br/>
This clip is from the chapter "Overview" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will look at the course overview and...
Curated Video
Structural Design Patterns in Modern C++ - Introduction to Protection Proxy
This video introduces you to the protection proxy.<br<br/>/>
This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Curated Video
Structural Design Patterns in Modern C++ - Applying Protection Proxy
This video explains how to apply the protection proxy.<br<br/>/>
This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Curated Video
Structural Design Patterns in Modern C++ - Protection Proxy Example
This video presents an example of the protection proxy.<br<br/>/>
This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Curated Video
Structural Design Patterns in Modern C++ - Pointer to IMPLementation (Plmpl) - Part II
This is the second part of the two-part video that explains how to implement PImpl to remove compilation dependencies.
<
br/>
This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern...
<
br/>
This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern...
Curated Video
Structural Design Patterns in Modern C++ - Pointer to IMPLementation (Plmpl) - Part I
This is the first part of the two-part video that explains the PImpl idiom.
<
br/>
This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge...
<
br/>
This clip is from the chapter "Bridge Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the bridge...
Curated Video
MongoDB Mastering MongoDB for Beginners (Theory and Projects) - Data Overview
In this video, we will cover data overview.<br<br/>/>
This clip is from the chapter "Spark with Mongo" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will cover Spark with Mongo.
This clip is from the chapter "Spark with Mongo" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will cover Spark with Mongo.
Curated Video
Blended Attacks
A complex cyberattack described as a "blended attack" makes use of a variety of malicious malware, computer viruses, worms, or Trojan horses in addition to several vulnerabilities in hardware or software that the attacker is aware of.
After Skool
The Greatest Secret Of The Rich
Often times it seems like the solution to all of our economic problems would be higher taxes on the rich. The thought is that taking money from the wealthiest people will somehow balance things out. Unfortunately, this theory has...
TMW Media
How to help someone who is grieving
Separate the myths from facts about bereavement, explore the process of mourning and moving on and learn how to be supportive and supportable. Losing someone you love or something you care about can be very painful. There is no right way...
Sustainable Business Consulting
What is a Green Team
Describes the functions and benefits of having a green team within your organization
Curated Video
Introduction to Corporate Governance
This video provides an introduction to corporate governance, which refers to the structure and framework of organizations at the highest levels to ensure ethical behavior for all stakeholders, while avoiding any negative impact on the...
Global Ethics Solutions
The Stuff of Work: Ethics and Assets
Applying business ethics principles is the responsibility of every employee, regardless of their role in the company. When employees are given company-owned assets to use, they have a responsibility to make sure they handle them with...
Global Ethics Solutions
Taking the High Road (Part 2 of 5)
Problems and consequences attributed to poor ethical decisions can arise when ethical behavior is not defined, understood, or demonstrated. Consistent focus on ethics helps to foster an environment where ethical behavior is valued,...
Global Ethics Solutions
Care of Company Assets - Actions for Success (Part 4)
This is the last of a four-part course on respecting company assets. This section covers the topics of occasional use, employee theft, and ethical actions for success. This course provides the helpful information that employees need to...
The Business Professor
Employment Discrimination under Title VII of the Civil Rights Act
Employment Discrimination under Title VII of the Civil Rights Act
Seven Dimensions
Creating a Safe and Professional Workplace Environment
In this video, the speaker discusses the issue of pornography on computers in the workplace and emphasizes the importance of establishing firm rules and a culture that promotes respect and professionalism.
The Business Professor
Consolidated Omnibus Budget Reconciliation Act (COBRA )
Consolidated Omnibus Budget Reconciliation Act (COBRA )
The Business Professor
Employee Privacy Rights in the Workplace
to privacy in the workplace. It covers topics such as limitations on recording employee communications, privacy expectations within the work environment, monitoring of employer-provided systems, and restrictions on polygraph testing as a...
The Business Professor
Labor Management Reporting and Disclosure Act
Labor Management Reporting and Disclosure Act
The Business Professor
Employer Witholding Requirements from Employee Wages
Employer Witholding Requirements from Employee Wages
Curated Video
Understanding Idioms: Getting Your Foot in the Door
In this video lesson, the teacher explains the concept of idioms and how to understand their meanings using context clues. The focus idiom is "to get one's foot in the door," and the teacher guides students through the process of...
Global Ethics Solutions
Wroking Sober! Intervention and Getting Help with Workplace Substance Abuse Problems
Substance abuse and addiction can have severe emotional, behavioral, and physical effects. This course teaches about the signs of addiction and helps participants learn the effects of substance abuse on the person and the workplace. This...