Hi, what do you want to do?
Curated Video
Sleep Eating with Sleeping Pills - 4 Ways to Avoid
Sleep eating with sleeping pills. It's not that uncommon and we call it complex sleep behaviors. Other behaviors include sleep driving, sleep eating and sleep texting. Sleep driving is commonly associated with the sleeping...
Curated Video
3 Easy Steps for ADHD Organization | ADHD Skills Part 3
Disorganization causes a lot of frustration and wasted time looking for things. And it can frustrate the people around you. Here are 3 steps to keep up with your stuff - Place, Retrieve and Return.
<
br/>
The starting point for...
<
br/>
The starting point for...
Curated Video
Always Forgetting? It may Be a Working Memory Problem
Do you always forget where you put your keys? Or what you were going to say when someone interrupts you? It's possible that you have a working memory problem. Watch this video to learn more about how working memory works and how...
Curated Video
Irregular Past Tense Verbs
"Irregular Past Tense Verbs" explores how to identify and form irregular past tense verbs.
Music Matters
Harmonic Sequences - Music Composition
How to write simple harmonic sequences over a bass line that is derived from the pattern of the circle of 5ths. By alternating intervals of the 4th and the 5th in the bass a descending bass line is created above which a systematic...
The Guardian
Garth Nix on Genre, Elements, and the Seventh Tower Series
Garth Nix answers fan questions. In this video, he explains why he writes fantasy novels, how he came up with the Seventh Tower series, and his historical and mythological influences in the development of the magic bells. Garth Nix...
Curated Video
Public Key Cryptography - Concepts
Quantum physicist Artur Ekert (Oxford and NUS) uses a mechanical analogy to describe the framework of public key cryptosystems that are used for secure data transmission.
Curated Video
Computational Complexity and Public Key Cryptography
Quantum physicist Artur Ekert (Oxford and NUS) describes how aspects of computational complexity are harnessed by cryptosystems like RSA (Rivest–Shamir–Adleman) which is a public-key cryptosystem that is widely used for secure data...
Music Matters
Using the Circle of Fifths on Piano - Music Theory
Learn the quickest and most efficient methods of modulating from one key to the next on the circle of 5ths. The first part of the video is devoted to movement from key to key moving left around the circle of 5ths, then the second part...
Music Matters
Writing a Rising Sequence - Music Composition
Learn how to evolve a rising sequence above a bass line employing a series of 4-3 suspensions alternating in the upper parts. We explore a Baroque technique that has broader application for harmonic writing, giving ideas for developing...
Curated Video
Mastering Keyboarding Technique
Explains the proper keyboarding technique and demonstrate how to use it for proficient typing.
Curated Video
History of the Hashtag
Everyday, millions of people around the world use hashtags to sift through the Internet’s endless content – but where did this ubiquitous symbol actually come from?
One Minute History
155 The Boston Coffee Party - One Minute History
During the American Revolution, women played an active role in the war effort as head of their households. Women in the colonies began serving coffee to their friends and family, in opposition to the British tax on tea. When a prominent...
Curated Video
The Homophone Police
Join police officer Taylor as she reviews what a homophone is. Decide if the owner of the sentence should get a writing ticket or not. Finally, complete the homophone challenge to impress your teacher.
Curated Video
AWS Security Boiled Down
A general overview about AWS security architecture and tools. Learn more about VPC, EC2, S3, AIM, Security Groups, and NACLs. This video will give you a quick jump into cloud security.
Curated Video
DKIM Email Security
In this tutorial, you will learn about DKIM and how to set it up on your DNS server.
Curated Video
Wireshark D2 V2 - Export Packets
DAY TWO - We will explore Wireshark interface in details - Video 2: Export packets
Curated Video
Scala & Spark-Master Big Data with Scala and Spark - Understanding Reduce by Key
In this session, you will learn about reduce by key.<br<br/>/>
This clip is from the chapter "Project" of the series "Scala & Spark-Master Big Data with Scala and Spark".This section primarily focuses on building a project on Scala Spark.
This clip is from the chapter "Project" of the series "Scala & Spark-Master Big Data with Scala and Spark".This section primarily focuses on building a project on Scala Spark.
Curated Video
Scala & Spark-Master Big Data with Scala and Spark - Overview of Maps
In this session, you will learn about maps in detail.
<
br/>
This clip is from the chapter "Data Structures" of the series "Scala & Spark-Master Big Data with Scala and Spark".This section focuses on data structures, and the types...
<
br/>
This clip is from the chapter "Data Structures" of the series "Scala & Spark-Master Big Data with Scala and Spark".This section focuses on data structures, and the types...
Curated Video
Scala & Spark-Master Big Data with Scala and Spark - Add and Remove Items from Maps
Learn how to add and remove/delete items from maps.
<
br/>
This clip is from the chapter "Data Structures" of the series "Scala & Spark-Master Big Data with Scala and Spark".This section focuses on data structures, and the types and...
<
br/>
This clip is from the chapter "Data Structures" of the series "Scala & Spark-Master Big Data with Scala and Spark".This section focuses on data structures, and the types and...
Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Creating Animations - Coding Challenge
This video presents a coding challenge on how to create animations.
<
br/>
This clip is from the chapter "Applying jQuery to Your Web Pages" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This video demonstrates...
<
br/>
This clip is from the chapter "Applying jQuery to Your Web Pages" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This video demonstrates...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Overview
This video provides an overview of Amazon S3.
<
br/>
This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about the various AWS...
<
br/>
This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn about the various AWS...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Encryption (Reminder)
This video explains the concept of encryption in Amazon Web Services (AWS).
<
br/>
This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will...
<
br/>
This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will...