The Business Professor
Technological Factors Affecting Marketing
Technological Factors Affecting Marketing
Barcroft Media
I Quit The City To Build My Hobbit House
GOING off-grid is something many dream of, but one former Londoner has actually followed through on his dream of living in a self-built house in the woods. Kris Harbour, 31, gave up his job, house, a flat he owned, and a busy social life...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Hip Hughes History
Beard's "An Economic Interpretation of the Constitution" in 5 Minutes
The skinny on the 1913 historical analysis of the US Constitution by Charles Beard. Wherever you stand on the issues, understanding elite theory is muy muy importante'. Designed for AP Gov. students, life long learners and the cray cray...
The Wall Street Journal
The Evolving Role Of The CIO
A big job is getting ever larger. What comes next, and what are the hard and soft skills needed to keep pace?
Mediacorp
When Social Media Backlash Goes Too Far
This video discusses the consequences of online vigilantism, using a real-life case of an Australian man working in Singapore who made controversial comments on Facebook. The video explores how his comments sparked a social media battle,...
Mediacorp
Online Vigilantism: The Power and Consequences of Digital Detectives
This video explores the phenomenon of online vigilantism, showcasing examples from China and Canada. It highlights the power of social media in exposing and addressing various issues, such as corruption, animal abuse, and consumer fraud....
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The (ISC)2 Code of Ethics
This video explains the various ethics. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk...
Brainwaves Video Anthology
Jeff Utecht - Community Trumps Content
Jeff Utecht is an educational technology consultant, educator and author. He holds a Master’s degree in Curriculum and Instruction with a focus in Technology as well as his administrative certification through Washington State. Jeff...
Next Animation Studio
SpaceX to build satellite mega constellation for Mars colony
In a recent interview with TIME magazine, SpaceX president and COO Gwynne Shotwell revealed the company’s latest Mars plans. She said: "Once we take people to Mars, they’re going to need a capability to communicate. In fact I think it...
Science360
4 Awesome Discoveries and a Thing You Probably Didn’t Hear About - Episode 40
In this science video: The singing, song-writing robot; privacy advisory; cloud seeding succeeding; safer self-driving; and arming yourself with tentacles. It’s 4 Awesome Discoveries and a Thing You Probably Didn’t Hear About. New...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Programming Electronics Academy
Connect Arduino to internet over USB (with Processing) - Simple Space Weather meter example (Part 1)
Have you ever wanted to connect your Arduino to the internet? Your first thought was probably like okay, I guess I'll need some type of Wi-Fi shield or a Wi-Fi enabled board in order to connect to the internet. But what if you're...
The Business Professor
Website URL and Social Media Handles
This Video Explains Website URL and Social Media Handles
Neuro Transmissions
How the internet turns us into trolls
We may have all engaged in some sort of unpleasant behavior thanks to the internet. But what makes someone want to troll the families of dead children or celebrities or vulnerable people? What is the psychology of trolls? How does...
All In One Social Media
7 Ways To Market WITHOUT Facebook or Instagram
It feels like Facebook and Instagram is a dumpster fire these days but you probably feel like you have to be posting there. WRONG! I haven't posted to my Facebook Page for MONTHS and my business is booming because I am marketing my...
Mediacorp
The Power of Mothers in Combating Hoaxes in Indonesia
In this video, a group of Indonesian housewives are being trained to combat fake news through the use of a hoax Buster app. With the rise of extremist groups targeting vulnerable recruits online, these mothers are taking the...
Next Animation Studio
Remote ID system proposed for drones in U.S. airspace
The Federal Aviation Administration has proposed using remote identification for unmanned aircraft systems in the U.S.
Mediacorp
Understanding Online Vigilantism and Its Impact on Social Media
This video discusses the issue of online vigilantism in Singapore, focusing on two specific cases: SMRT feedback, an anonymous group accused of harassment, and Roads.sg, a website that exposes bad behavior on the roads. The video...
APMonitor
Python Import Online Data and Analyze
There are many online sources of data. Python is capable to access, parse, and display data from databases, data streams, or other sources. The Internet of Things (IoT) depends on devices and programs (such as Python) communicating with...
All In One Social Media
What Is Reputation Management? - Online Reputation Management 101
What Is Reputation Management? - Online Reputation Management 101 // Your online reputation can be a huge asset and help drive you sales and referrals. It can also hurt you and harm your brand with poo reviews and feedback even if you...
AllTime 10s
10 False Memories Everyone Believes
Humpty Dumpty was your favourite childhood egg right? Well maybe not favourite, but he wasn't a bad egg. Wait? What?! He wasn't even an egg?!?! Well I never. Here are 10 more well I never false memories everyone believes.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Weak Configurations
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be...