Hi, what do you want to do?
Curated Video
How can AI Transform Project Management?
Any video about Artificial Intelligence is likely to be – at best – provisional. The technology is improving fast and what seems possible now is likely to be little more than the leading edge of a massive transformation. With that said,...
Curated Video
Risk Management for Cyber Security Managers - Risk Management Scope and Roles
In this lesson, we will look at the scope of cyber risk management and the different kinds of roles under cyber risk management.
Curated Video
Exploring the Benefits of VoIP and Skype: Revolutionizing Communication
Skype is a VoIP application that allows users to make untimed and long-distance phone calls for free using an internet connection. With its peer-to-peer technology, Skype enables direct communication between users' computers, eliminating...
Curated Video
Revolutionizing Salmonella Analysis: Bluefuse Software Enhances Speed and Accuracy
The Bluefuse software developed by a company in Cambridge, England, has revolutionized the analysis of salmonella samples, improving both speed and accuracy. By using statistical models to differentiate between data and noise, the...
Brainwaves Video Anthology
Gene Kim - Wiring the Winning Organization
Gene Kim is a Wall Street Journal bestselling author, researcher, and multiple award-winning CTO. He has been studying high-performing technology organizations since 1999 and was the founder and CTO of Tripwire for 13 years. He is the...
Curated Video
What is Release Management? Project Management in Under 5
Projects - especially IT projects - need to release new software into a live environment. So, what is Release Management?
Curated Video
What is a Business Blueprint? Project Management in Under 5
In the world of business transformation, what is the master plan that guides the definition and planning of your project? It's a Business Blueprint. So, what is a Business Blueprint?
Curated Video
What is a Functional Specification? Project Management in Under 5
On software and technical projects, there is a chain of project definition deliverables, and one of them is the Functional Specification. So, what is a Functional Specification?
Curated Video
Practical Cyber Hacking Skills for Beginners - Cyber Security Auditing
This audit provides a way for the management to assess how effective the cyber security policy is for a business organization or a federal networking structure.
Curated Video
Easy File Conversion
Learn how to convert files between different formats quickly and easily. This video covers online tools and software for converting documents, images, and media files. Save time by knowing the best methods for file conversion.
Curated Video
Revolutionizing Animation: The Science Behind Realistic Visual Effects
This video discusses the use of advanced CGI rendering techniques, specifically ray tracing, in creating realistic environments and materials for animated films. Developed by a former NASA engineer, this software accurately simulates how...
Curated Video
New Software Gives Stephen Hawking a Voice: Project Hawking
This video discusses the development of new software, called Elocutor, designed to help the world-renowned scientist Stephen Hawking communicate more efficiently. As his previous software became outdated and unmodifiable, Elocutor was...
Curated Video
How to Implement Change... in the Face of Resistance to Change
Let’s face it, whenever we implement change, we face resistance. So, let’s look at how to handle the five commonest forms of resistance, to make your change implementation a success. People will resist change. That’s a given. People will...
Curated Video
What is a PERT Chart? Project Management in Under 5
When it comes to project planning and estimation, there are a few 'go-to' tools that every project manager should know, and one of them is the PERT Method. So, what is a PERT Chart?
Curated Video
Just Sayin' - Simple Truths about Project Management
Just Sayin' - wit and wisdom that yields a few simple truths about project management. This short video aims to give you amusement and insight in equal measure. It contains a few simple truth about project management, expressed as pithy...
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - BleachBit
In this lesson, we will look at a trendy yet controversial tool called BleachBit to clear files.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Using GMER - Rootkit Scanner
This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Rootkits
In this video, we will try to understand rootkits, one of the most dangerous forms of malware.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Darknets
In this video, we will look at some of the websites classified on the dark web that allows you to browse websites or post questions anonymously.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Tor Weaknesses
Here, the author elaborates on the disadvantages of using Tor to browse the Internet.
Curated Video
Practical Cyber Hacking Skills for Beginners - Introduction to Hashcat
This video introduces a tool that is an advanced password recovery tool and is available on various platforms.
Curated Video
Practical Cyber Hacking Skills for Beginners - The Hacking Methodology
Here, you will learn more about the different hacking methodologies that hackers employ to cause harm to a system or a network and also understand the possibilities of minimizing the attacks.