Hi, what do you want to do?
IDG TECHtalk
Best Windows network hardening advice from MITRE D3FEND
The new MITRE D3FEND knowledge graph of cybersecurity countermeasures offers solid guidance for Windows admins.
IDG TECHtalk
How to block malicious JavaScript files in Windows environments
Attackers use malicious JavaScript files masquerading as legitimate updates to execute ransomware and other malware attacks. These simple steps will stop them.
IDG TECHtalk
How to set up Azure AD to spot risky users
You have several options to set up alerts in Azure Active Directory to help spot risky user behavior. If you have a suggestion for a future episode of Windows Security Tips, leave it in the comments below.
Economics Explained
The Economics of Andrew Yang
This is Andrew Yang: a tech entrepreneur and a bit of a surprise underdog democratic candidate for the U.S. presidency. And while it's true that this channel avoids politics at all costs, EE is not politically advocating for (or...
Financial Times
What are leveraged loans?
Where do companies already in debt turn to for credit? Leveraged lending has seen a rapid rise since the financial crisis of 2008, hitting over $1tn in the US alone. But as lender protections weaken and more investors snap up these risky...
Institute of Art and Ideas
Evolution and the future of gender
Many neuroscientists believe disorders of the mind will be solved when we understand the differences between the male and female brain. Yet is is frequently argued that men and women are not born but made. Are mental differences between...
Curated Video
Understanding and Using Automatic Stabilizers in Economics
This video discusses automatic stabilizers and how they adjust to economic cycles and affect fiscal stimulus. He explains the technical aspects of automatic stabilizers, such as tax revenue, government spending, and welfare costs....
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Azure Policy Walkthrough and Lab Activity
In this video, we will cover Azure policy walkthrough and lab activity.
r/>
This clip is from the chapter "Azure Governance and Compliance." of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn about...
r/>
This clip is from the chapter "Azure Governance and Compliance." of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn about...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Azure Policy Lab Activity
In this video, we will cover Azure policy lab activity.
r/>
This clip is from the chapter "Azure Governance and Compliance." of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn about management groups and...
r/>
This clip is from the chapter "Azure Governance and Compliance." of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn about management groups and...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - User Accounts
This video discusses the best practices and tasks involved in user account creation and management. This clip is from the chapter "Solutions Architect Chapter 8 – Identity and Access Management (IAM) Best Practices" of the series "AWS...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Identity and Access Management (IAM) Overview
This video introduces the fundamental concepts of IAM.
r/>
This clip is from the chapter "Solutions Architect Chapter 7 - Identity and Access Management (IAM)" of the series "AWS Solutions Architect Associate (SAA-C02) Exam...
r/>
This clip is from the chapter "Solutions Architect Chapter 7 - Identity and Access Management (IAM)" of the series "AWS Solutions Architect Associate (SAA-C02) Exam...
Curated Video
Elasticsearch 7 and Elastic Stack - In Depth and Hands On! - Index Lifecycle Management
This video explains how to manage indices through effective index lifecycle management.
r/>
This clip is from the chapter "Elasticsearch Operations" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This...
r/>
This clip is from the chapter "Elasticsearch Operations" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This...
Curated Video
Elasticsearch 7 and Elastic Stack - In Depth and Hands On! - Snapshots Lifecycle Management
This video explains snapshots lifecycle management.
r/>
This clip is from the chapter "Elasticsearch Operations" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This section explains the concept of...
r/>
This clip is from the chapter "Elasticsearch Operations" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This section explains the concept of...
Hip Hughes History
The Good Neighbor Policy Explained in 5 Minutes: US History Review
A fun and focused introductory video lecture by an experienced teacher describing the essentials of FDR's Good Neighbor policy with Latin America. Perfect for life long learners, social studies students and lost college kids.
The March of Time
US Nebraska Senator Butler reprisal
MOT 1944: U.S. NEBRASKA SENATOR BUTLER: MS Senate Office building, Washington D.C. INT MS Door sign 'Mr. Butler, Nebraska.' REPRISAL: INT VS Senator Hugh A. Butler (1878-1954) speaking '...we've got to treat the people of Latin America...
IDG TECHtalk
Preventing data leakage in Windows (3:29)
Set data loss prevention policies in Windows 10 to prevent data leakage.
Curated Video
The Thirteenth, Fourteenth and Fifteenth Amendments- Equal Protection Under the Law
This information provided in this video help students to understand the impact of the thirteenth, fourteenth and fifteenth amendments to the constitution. The thirteenth abolished slavery. The fourteenth provided “equal protection” of...
Curated Video
Demand and Supply of Money and Monetary Policy: Understanding Wealth and Money Supply
This video is a lesson on the demand and supply of money in the economic system. It explains the difference between wealth and money, the components of the money supply, and how it accommodates the demand for money. It discusses terms...
Curated Video
Introduction to Economic Policies: Goals, Performance, and Policy Tools
This lecture gives an introduction to economic policies and their relationship with economic activity, economic performance, and economic objectives. The various macroeconomic objectives are discussed, such as inflation rate,...
IDG TECHtalk
Preventing malicious links in Windows (5:28)
Set Office 365 Advanced Threat Protection policies to block known malicious URL addresses.
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Setting Up Your Environment
In this video, we'll learn about setting up your environment.
r/>
This clip is from the chapter "Introduction to AWS Certified Cloud Practitioner CLF-C01 and Cloud Computing" of the series "AWS Certified Cloud Practitioner...
r/>
This clip is from the chapter "Introduction to AWS Certified Cloud Practitioner CLF-C01 and Cloud Computing" of the series "AWS Certified Cloud Practitioner...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Identity and Access Management (IAM) Services
This video introduces you to IAM services that allow you to manage multiple Amazon Web Services (AWS) accounts. You will also learn some basic concepts in this video.
r/>
This clip is from the chapter "Essentials Chapter 2 –...
r/>
This clip is from the chapter "Essentials Chapter 2 –...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Merging without Approvals
This video explains how, by default, merging without approvals is allowed.
r/>
This clip is from the chapter "Pull Requests" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...
r/>
This clip is from the chapter "Pull Requests" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains how to...