IDG TECHtalk
How an attacker can target phishing attacks
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can...
Economics Explained
Limitless Growth Is Possible If We Run Our Economies Correctly: GDP Growth
Society has an unlimited desire for material goods but the world has limited resources to supply these goods. Ever since the industrial revaluation most advanced economies have consistently increased their economic output over time. At...
Economics Explained
Is Hyperinflation Coming?: Is Inflation Good or Bad
Inflation is something we more or less take for granted these days. The idea that 5 dollars today is not going to be able to buy 5 dollars worth of stuff in the future, and the fact that you used to be able to buy a family home for 10...
Curated Video
Advanced Swift 2 Application Development (Video 5)
The number of smartphone users is increasing every single day, and as more and more of them are looking for new and interesting ways to improve their lives through mobile applications, the need for a language that will deploy on all...
Curated Video
Mastering Grunt (Video 7)
Grunt is everywhere. From JavaScript projects in jQuery to Twitter Bootstrap, everyone's using Grunt to convert code, run tests, and produce distributions for production. Web development activities are marked by repetitive tasks such as...
Curated Video
Mastering Grunt (Video 25)
Grunt is everywhere. From JavaScript projects in jQuery to Twitter Bootstrap, everyone's using Grunt to convert code, run tests, and produce distributions for production. Web development activities are marked by repetitive tasks such as...
Next Animation Studio
How ‘Delta Force’ killed one-legged ISIS boss
From a tip, to a drone’s camera spotting a one-legged terrorist in his rooftop bath — to a firefight inside a wasp’s nest.
Curated Video
Be S.M.A.R.T: Actionable Steps to Turn Your Dreams into Reality
Often we are told to set goals and dream big, but how do you go about turning those dreams into reality. In this video, I describe a quick and easy way to start turning your dreams into actionable steps. Many people spend their lives...
Hip Hughes History
HB2 Explained: Bathroom Rules for Transgender Citizens
An overview of the bathroom bill passed in North Carolina law known as HB2.
The Business Professor
Marketing - How Do We Segment Business Markets
This Video Explains Marketing - How Do We Segment Business Markets
Curated Video
Ansible for the Absolute Beginner - Demo - Ansible Inventory
This video demonstrates how to use Ansible inventory. This clip is from the chapter "Introduction to Ansible Inventory" of the series "Ansible for the Absolute Beginner - Hands-On – DevOps".This section focuses on Ansible inventory.
The Business Professor
Variations in Assumptions - Sensativity Analysis
A sensitivity analysis is used to test how variations in specific factors affect an outcome. The assumptions employed as part of the situational analysis are generally based on historical information, hypotheical contexts, and constancy
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - EternalBlue Exploit
This video introduces you to a cyberattack exploit, EternalBlue. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn...
Curated Video
Advanced Swift 2 Application Development (Video 19)
The number of smartphone users is increasing every single day, and as more and more of them are looking for new and interesting ways to improve their lives through mobile applications, the need for a language that will deploy on all...
The March of Time
1944: XXI BOMBER COMMAND HEADQUARTERS: WS Jeep driving toward Headquarters (HQ) of 21st Bomber Command. INT VS Pilots watching radar scope, male at board talking about bombing targets (SOT). World War II, WWII, strategy, attack plan, Pacific Front
MOT 1944: XXI BOMBER COMMAND HEADQUARTERS: WS Jeep driving toward Headquarters (HQ) of 21st Bomber Command. INT VS Pilots watching radar scope, male at board talking about bombing targets (SOT). World War II, WWII, strategy, attack plan,...
National Parks Service
Acadia National Park - Floating Classroom: Accuracy
These videos compliment the variety of water quality programs that occur in Acadia National Park. For teachers looking for good background information on water quality or those looking to attend the Floating Classroom field trip, this...
Next Animation Studio
Ukraine’s MIG killer: how the Stinger missile works
The Stinger missile system is the world’s most legendary MANPAD, or Man-Portable Air Defense System, and the U.S. is sending many to Ukraine.
Seven Dimensions
Setting Targets and Goals for a Sustainable Future
This video discusses the importance of setting targets and goals to motivate individuals to make a positive impact on the planet.
IDG TECHtalk
Top enterprise VPN vulnerabilities
Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.
Packt
Two Sum
This video explains how to add two linked lists. This clip is from the chapter "Question 1: Two Sum" of the series "Data Structures and Algorithms: The Complete Masterclass".This section explains adding two linked list.
Packt
Event Listeners & the Event Object
DOM Manipulation & Events: Event Listeners & the Event Object This clip is from the chapter "DOM Manipulation & Events" of the series "Modern JavaScript from the Beginning".In this section, you will learn about DOM, examining the...
Curated Video
TypeScript for Beginners - Accessor Methods
This video demonstrates how to work with accessor methods. This clip is from the chapter "Access Modifiers, Encapsulation, and Static" of the series "TypeScript for Beginners".This section introduces you to access modifiers,...
Curated Video
DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Jenkins SNAPSHOT Builds
In this video, you will be able to configure the plugins for building snapshot releases. This clip is from the chapter "Continuous Integration and Continuous Deploy" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK,...