TED Talks
TED: Europe's plan to become the first carbon-neutral continent | Ursula von der Leyen
With the ambitious goal of becoming the first carbon-neutral continent by 2050, the European Union has committed to creating a greener world for future generations. In this bold talk, Ursula von der Leyen, President of the European...
TED Talks
TED: How labor unions shape society | Margaret Levi
The weekend. Social Security. Health insurance. What do these things have in common? They all exist thanks to the advocacy of labor unions. Political economist Margaret Levi explains how these organizations forge equality and protect...
TED Talks
TED: The ethical dilemma of designer babies | Paul Knoepfler
Creating genetically modified people is no longer a science fiction fantasy; it's a likely future scenario. Biologist Paul Knoepfler estimates that within fifteen years, scientists could use the gene editing technology CRISPR to make...
Let's Tute
Understanding the key aspects of Insurance
In this session you will understand the different key aspects of Insurance. 1] Transaction Cycle 2] Claim Settlement Procedure 3] Exclusions 4] Nomination and Assignments In the transactions cycle you will know the research on insurance....
Curated Video
The History of Cracker Barrel
Weird History Food is talking about the history of Cracker Barrel. We're pulling off on the next exit because we saw a billboard for the Cracker Barrel. Originally built as a filling station, we're going to show you how Cracker Barrel...
Curated Video
Should a Project Manager Get Involved in Contract Negotiations?
Should a Project Manager get involved in Contract Negotiations? This is the essence of a question I was asked. If we leave the negotiations entirely to procurement teams, then decisions will be based on: • Procurement rules • Simplistic...
Curated Video
European Space Agency's Exciting Missions and Future Plans in 2005
In 2005, the European Space Agency achieved significant milestones in space exploration and technology. From landing on Titan and sampling its atmosphere to launching the heaviest commercial launcher, the Arian 510 ton, Europe made great...
Curated Video
What is Business Analysis? And what is a Business Analyst?
Project Management and Business Analysis. It's like strawberries and cream - you can't have one without another. But what is Business Analysis and what does a Business Analyst do? Business Analysis is the process of identifying business...
Curated Video
What are Project Constraints?
Some things constrain the choices you can make, when you plan and deliver your project. They get in your way and it will not do, to ignore them. So, what are Project Constraints?
Curated Video
Practical Cyber Hacking Skills for Beginners - Creating a Sample Outbound Rule
In this lesson, we will look at creating a sample outbound rule; we will test it out by trying to block internet access by setting outbound rules for the Google Chrome browser.
Wonderscape
King Charles III's Coronation: Tradition Meets Modern Values
King Charles III's coronation on May 6, 2023, balanced royal tradition with contemporary touches. From a gospel choir performance to sustainable choices in his attire and ceremony, the King brought a modern sensibility to the historic...
Curated Video
Hands-On Continuous Integration and Automation with Jenkins - Configure the EC2 Plugin
This video introduces AWS concepts like IAM policy, IAM user, and AMI, and shows how to add AWS credentials to Jenkins and install and configure the EC2 plugin.
Curated Video
Data Science Model Deployments and Cloud Computing on GCP - Lab - Set Up Alerting for Cloud-Run Applications
In this lab video, you will be setting up an alerting system for cloud-run applications. This clip is from the chapter "Cloud Scheduler and Application Monitoring" of the series "Data Science Model Deployments and Cloud Computing on...
Curated Video
Fundamentals of Secure Software - Security Models
This video explains the various security models and their purpose.
Curated Video
Fundamentals of Secure Software - CSP (Content Security Policy)
This video demonstrates the Content Security Policy.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Data Security Policies
It would be remiss to discuss database design without addressing policies. We discussed security in general earlier and now will explain why policies are important.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Authorization Policies
Once authenticated, the user will have full capabilities or limited capabilities based on permissions within AWS. A primary method of permission management is authorization policy, which is covered here.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Identity and Access Management (IAM) Overview
How do you control who or what has access to your AWS account and the services running in it? The answer is Identity and Access Management (IAM) and this video introduces the fundamental concepts of IAM.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Endpoints
What if you want services to access other services indirectly? You can use endpoints. Unlike the traditional term in networking, AWS uses the term endpoint to refer to something different. This video explains how AWS uses the term.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Storage Access Security Lab
Creating storage solutions in Amazon Web Services (AWS) is one thing, and it is another thing to ensure their security. In this video, you will explore the storage security features of AWS, including the console and CLI.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - IAM…What?
In this video, we will understand the Identity and Access Management (IAM) service used to secure access to AWS services, manage the root account, create users, group permissions, roles, and more.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Policy Conditions
Policy conditions impact when and how a policy is applied in AWS. In this video, you will see how to create an IAM policy and define policy conditions.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - IAM Roles
When you want an application or CLI interface to access AWS and its services, you can use IAM roles. This video explores the process used to create and manage roles in AWS.
Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Principle of Least Privilege
One of the biggest and most common mistakes made in security management is granting too many permissions to a user. The principle of least privilege can assist in preventing this and it is covered in this video.