The Business Professor
Belbin Team Roles
What are Belbin Team Roles? The Belbin Team Inventory, also called Belbin Self-Perception Inventory or Belbin Team Role Inventory, is a behavioural test. It was devised by Raymond Meredith Belbin to measure preference for nine Team...
The Business Professor
RASCI or RASIC Model - Explained
What is the RASCI or RASIC Model? RASCI is a matrix (i.e. chart, model or framework) that is used to help identify all the roles and responsibilities of each stakeholder on a project. It clearly defines who is working on a specific...
The Business Professor
Establishing Team Dynamics: The Importance of a Team Contract
This video discusses the concept of a team contract and its importance in establishing clear roles, expectations, and norms within a team.
Curated Video
Producers, Consumers, and Decomposers
Producers, Consumers, and Decomposers explains the roles of producers, consumers, and decomposers within an ecosystem.
Curated Video
Daughters of Liberty
Daughters of Liberty examines and explains the changing roles and impact of significant women during the Revolutionary time.
Planet PE
GCSE PE revision 1.1.2 Opportunities & Initiatives - PlanetPE app podcasts
Check out this GCSE PE revision on the opportunities, Initiatives and the sports participation pyramid.
Curated Video
Population Ecology: What Causes Populations to Change?
a video entitled “Population Ecology: What Causes Populations to Change?” which discusses the roles of organisms in a habitat and explores how organisms affect one another and limited resources when interacting.
Curated Video
Ultimate ASP.NET 5 Web API Development Guide - Add Default User Roles
This video talks about adding default user roles. This clip is from the chapter "Securing Your Application" of the series "Ultimate ASP.NET Core Web API Development Guide".This section focuses on securing your application.
Curated Video
Structural Design Patterns in Modern C++ - Introduction to Protection Proxy
This video introduces you to the protection proxy. This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Curated Video
Structural Design Patterns in Modern C++ - Applying Protection Proxy
This video explains how to apply the protection proxy. This clip is from the chapter "Proxy Design Pattern" of the series "Structural Design Patterns in Modern C++".This section focuses on the proxy design pattern.
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - AWS Services Security Deep Dive (1/3)
This video is the first part of the three-part video that explains the AWS security features in detail. This clip is from the chapter "Domain 6: Security" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this...
Curated Video
Ultimate ASP.NET 5 Web API Development Guide - Set Up User Identity Core
This video shows setting up user identity core. This clip is from the chapter "Securing Your Application" of the series "Ultimate ASP.NET Core Web API Development Guide".This section focuses on securing your application.
Curated Video
Scala & Spark-Master Big Data with Scala and Spark - Spark Group By
Learn the grouping mechanism in Spark in this session. This clip is from the chapter "Project" of the series "Scala & Spark-Master Big Data with Scala and Spark".This section primarily focuses on building a project on Scala Spark.
Curated Video
MongoDB Mastering MongoDB for Beginners (Theory and Projects) - Creating User in Atlas
In this video, we will be creating a user in Atlas. This clip is from the chapter "Mongo with Node" of the series "MongoDB—Mastering MongoDB for Beginners (Theory and Projects)".In this section, we will cover Mongo with Node.
Curated Video
Ultimate ASP.NET 5 Web API Development Guide - Protecting Endpoints
This video helps in protecting endpoints. This clip is from the chapter "Securing Your Application" of the series "Ultimate ASP.NET Core Web API Development Guide".This section focuses on securing your application.
Curated Video
Transition from ISO 27001-2013 to ISO 27001-2022 controls
In this video, we will be discussing the transition from ISO 27001-2013 to ISO 27001-2022 controls. ISO 27001 is a globally recognized standard for information security management systems. The 2013 version of the standard has been in use...
Mister Simplify
Vygotsky’s theory of Social Development - Simplest explanation ever
Vygotsky's Theory of Social Development is as much a benchmark as Piaget's theory in understanding child psychology and cognition. It was, and is still used to develop curriculum the world over. This video covers the important aspects of...
JJ Medicine
Notch Signaling Pathway | Purpose and Mechanism
Lesson on the Notch Signaling Pathway. The Notch signaling pathway is a highly conserved and critically important pathway in homeostasis and the development of sensory hair cells and branched arterial networks. The Notch signaling...
Curated Video
Communicating Change: Strategies for Effective Implementation in a Business Environment
The video discusses the importance of effective communication when implementing strategic change within a business. The speaker highlights potential pitfalls that can occur when poorly communicating strategic change to lower levels of...
TLDR News
Points Based Immigration: The UK's New System Explained - Brexit Explained
Last week the UK government finally explained how immigration will work post brexit, laying out their new points-based immigration system. We explain how the new system works, how points are earned and who will gain entry to the UK. We...
The Wall Street Journal
Behind The Numbers: The 2018 Women In The Workplace Report 2018
A deep dive into the findings from the "Women in the Workplace 2018" report with Rachel Thomas, co-founder and president at LeanIn.Org and Lareina Yee, senior partner at McKinsey & Company and WSJ's Lynn Cook.
Science360
Picture Yourself Where Discoveries Begin - Business Operations
Rafael Cotto, Jeff Cunningham and Anita Browne Cordova provide an overview of many business operations roles supporting NSF discoveries.