Instructional Video4:53
IDG TECHtalk

How an attacker can target phishing attacks

Higher Ed
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
Instructional Video3:52
Economics Explained

Limitless Growth Is Possible If We Run Our Economies Correctly: GDP Growth

9th - Higher Ed
Society has an unlimited desire for material goods but the world has limited resources to supply these goods. Ever since the industrial revaluation most advanced economies have consistently increased their economic output over time. At...
Instructional Video3:51
Economics Explained

Is Hyperinflation Coming?: Is Inflation Good or Bad

9th - Higher Ed
Inflation is something we more or less take for granted these days. The idea that 5 dollars today is not going to be able to buy 5 dollars worth of stuff in the future, and the fact that you used to be able to buy a family home for 10...
Instructional Video4:19
Curated Video

Advanced Swift 2 Application Development (Video 5)

Higher Ed
The number of smartphone users is increasing every single day, and as more and more of them are looking for new and interesting ways to improve their lives through mobile applications, the need for a language that will deploy on all...
Instructional Video5:45
Curated Video

Mastering Grunt (Video 7)

Higher Ed
Grunt is everywhere. From JavaScript projects in jQuery to Twitter Bootstrap, everyone's using Grunt to convert code, run tests, and produce distributions for production. Web development activities are marked by repetitive tasks such as...
Instructional Video4:13
Curated Video

Mastering Grunt (Video 25)

Higher Ed
Grunt is everywhere. From JavaScript projects in jQuery to Twitter Bootstrap, everyone's using Grunt to convert code, run tests, and produce distributions for production. Web development activities are marked by repetitive tasks such as...
Instructional Video1:11
Next Animation Studio

How ‘Delta Force’ killed one-legged ISIS boss

12th - Higher Ed
From a tip, to a drone’s camera spotting a one-legged terrorist in his rooftop bath — to a firefight inside a wasp’s nest.
Instructional Video8:34
Curated Video

Be S.M.A.R.T: Actionable Steps to Turn Your Dreams into Reality

9th - Higher Ed
Often we are told to set goals and dream big, but how do you go about turning those dreams into reality. In this video, I describe a quick and easy way to start turning your dreams into actionable steps. Many people spend their lives...
Instructional Video8:00
Hip Hughes History

HB2 Explained: Bathroom Rules for Transgender Citizens

6th - 12th
An overview of the bathroom bill passed in North Carolina law known as HB2.
Instructional Video3:06
The Business Professor

Marketing - How Do We Segment Business Markets

Higher Ed
This Video Explains Marketing - How Do We Segment Business Markets
Instructional Video5:04
Curated Video

Ansible for the Absolute Beginner - Demo - Ansible Inventory

Higher Ed
This video demonstrates how to use Ansible inventory. This clip is from the chapter "Introduction to Ansible Inventory" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section focuses on Ansible inventory.
Instructional Video5:11
The Business Professor

Variations in Assumptions - Sensativity Analysis

Higher Ed
A sensitivity analysis is used to test how variations in specific factors affect an outcome. The assumptions employed as part of the situational analysis are generally based on historical information, hypotheical contexts, and constancy
Instructional Video20:21
Curated Video

The Complete Ethical Hacking Bootcamp: Beginner To Advanced - EternalBlue Exploit

Higher Ed
This video introduces you to a cyberattack exploit, EternalBlue. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...
Instructional Video6:35
Curated Video

Advanced Swift 2 Application Development (Video 19)

Higher Ed
The number of smartphone users is increasing every single day, and as more and more of them are looking for new and interesting ways to improve their lives through mobile applications, the need for a language that will deploy on all...
Instructional Video0:41
The March of Time

1944: XXI BOMBER COMMAND HEADQUARTERS: WS Jeep driving toward Headquarters (HQ) of 21st Bomber Command. INT VS Pilots watching radar scope, male at board talking about bombing targets (SOT). World War II, WWII, strategy, attack plan, Pacific Front

12th - Higher Ed
MOT 1944: XXI BOMBER COMMAND HEADQUARTERS: WS Jeep driving toward Headquarters (HQ) of 21st Bomber Command. INT VS Pilots watching radar scope, male at board talking about bombing targets (SOT). World War II, WWII, strategy, attack plan,...
Instructional Video2:58
National Parks Service

Acadia National Park - Floating Classroom: Accuracy

Pre-K - Higher Ed
These videos compliment the variety of water quality programs that occur in Acadia National Park. For teachers looking for good background information on water quality or those looking to attend the Floating Classroom field trip, this...
Instructional Video1:05
Next Animation Studio

Ukraine’s MIG killer: how the Stinger missile works

12th - Higher Ed
The Stinger missile system is the world’s most legendary MANPAD, or Man-Portable Air Defense System, and the U.S. is sending many to Ukraine.
Instructional Video1:12
The Business Professor

Adware

Higher Ed
Explanation of Adware
Instructional Video1:13
Seven Dimensions

Setting Targets and Goals for a Sustainable Future

Higher Ed
This video discusses the importance of setting targets and goals to motivate individuals to make a positive impact on the planet.
Instructional Video5:12
IDG TECHtalk

Top enterprise VPN vulnerabilities

Higher Ed
Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.
Instructional Video12:47
Packt

Two Sum

Higher Ed
This video explains how to add two linked lists. This clip is from the chapter "Question 1: Two Sum" of the series "Data Structures and Algorithms: The Complete Masterclass".This section explains adding two linked list.
Instructional Video10:12
Packt

Event Listeners & the Event Object

Higher Ed
DOM Manipulation & Events: Event Listeners & the Event Object This clip is from the chapter "DOM Manipulation & Events" of the series "Modern JavaScript from the Beginning".In this section, you will learn about DOM, examining the...
Instructional Video2:03
Curated Video

TypeScript for Beginners - Accessor Methods

Higher Ed
This video demonstrates how to work with accessor methods. This clip is from the chapter "Access Modifiers, Encapsulation, and Static" of the series "TypeScript for Beginners".This section introduces you to access modifiers,...
Instructional Video5:49
Curated Video

DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Jenkins SNAPSHOT Builds

Higher Ed
In this video, you will be able to configure the plugins for building snapshot releases. This clip is from the chapter "Continuous Integration and Continuous Deploy" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK,...