Instructional Video2:21
The Business Professor

Technological Factors Affecting Marketing

Higher Ed
Technological Factors Affecting Marketing
Instructional Video9:28
Barcroft Media

I Quit The City To Build My Hobbit House

Higher Ed
GOING off-grid is something many dream of, but one former Londoner has actually followed through on his dream of living in a self-built house in the woods. Kris Harbour, 31, gave up his job, house, a flat he owned, and a busy social life...
Instructional Video10:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices

Higher Ed
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Instructional Video5:33
Hip Hughes History

Beard's "An Economic Interpretation of the Constitution" in 5 Minutes

6th - 12th
The skinny on the 1913 historical analysis of the US Constitution by Charles Beard. Wherever you stand on the issues, understanding elite theory is muy muy importante'. Designed for AP Gov. students, life long learners and the cray cray...
Instructional Video31:18
The Wall Street Journal

The Evolving Role Of The CIO

Higher Ed
A big job is getting ever larger. What comes next, and what are the hard and soft skills needed to keep pace?
Instructional Video3:41
Mediacorp

When Social Media Backlash Goes Too Far

12th - Higher Ed
This video discusses the consequences of online vigilantism, using a real-life case of an Australian man working in Singapore who made controversial comments on Facebook. The video explores how his comments sparked a social media battle,...
Instructional Video10:05
Mediacorp

Online Vigilantism: The Power and Consequences of Digital Detectives

12th - Higher Ed
This video explores the phenomenon of online vigilantism, showcasing examples from China and Canada. It highlights the power of social media in exposing and addressing various issues, such as corruption, animal abuse, and consumer fraud....
Instructional Video4:25
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The (ISC)2 Code of Ethics

Higher Ed
This video explains the various ethics. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk...
Instructional Video6:26
Brainwaves Video Anthology

Jeff Utecht - Community Trumps Content

Higher Ed
Jeff Utecht is an educational technology consultant, educator and author. He holds a Master’s degree in Curriculum and Instruction with a focus in Technology as well as his administrative certification through Washington State. Jeff...
Instructional Video1:17
Next Animation Studio

SpaceX to build satellite mega constellation for Mars colony

12th - Higher Ed
In a recent interview with TIME magazine, SpaceX president and COO Gwynne Shotwell revealed the company’s latest Mars plans. She said: "Once we take people to Mars, they’re going to need a capability to communicate. In fact I think it...
Instructional Video3:43
Science360

4 Awesome Discoveries and a Thing You Probably Didn’t Hear About - Episode 40

12th - Higher Ed
In this science video: The singing, song-writing robot; privacy advisory; cloud seeding succeeding; safer self-driving; and arming yourself with tentacles. It’s 4 Awesome Discoveries and a Thing You Probably Didn’t Hear About. New...
Instructional Video8:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks

Higher Ed
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Instructional Video8:03
Programming Electronics Academy

Connect Arduino to internet over USB (with Processing) - Simple Space Weather meter example (Part 1)

Higher Ed
Have you ever wanted to connect your Arduino to the internet? Your first thought was probably like okay, I guess I'll need some type of Wi-Fi shield or a Wi-Fi enabled board in order to connect to the internet. But what if you're...
Instructional Video3:54
The Business Professor

Website URL and Social Media Handles

Higher Ed
This Video Explains Website URL and Social Media Handles
Instructional Video12:28
Neuro Transmissions

How the internet turns us into trolls

12th - Higher Ed
We may have all engaged in some sort of unpleasant behavior thanks to the internet. But what makes someone want to troll the families of dead children or celebrities or vulnerable people? What is the psychology of trolls? How does...
Instructional Video11:27
All In One Social Media

7 Ways To Market WITHOUT Facebook or Instagram

Higher Ed
It feels like Facebook and Instagram is a dumpster fire these days but you probably feel like you have to be posting there. WRONG! I haven't posted to my Facebook Page for MONTHS and my business is booming because I am marketing my...
Instructional Video4:09
Mediacorp

The Power of Mothers in Combating Hoaxes in Indonesia

12th - Higher Ed
In this video, a group of Indonesian housewives are being trained to combat fake news through the use of a hoax Buster app. With the rise of extremist groups targeting vulnerable recruits online, these mothers are taking the...
Instructional Video1:59
The Business Professor

Viral Marketing

Higher Ed
Explanation of Viral Marketing
Instructional Video1:22
Next Animation Studio

Remote ID system proposed for drones in U.S. airspace

12th - Higher Ed
The Federal Aviation Administration has proposed using remote identification for unmanned aircraft systems in the U.S.
Instructional Video7:00
Mediacorp

Understanding Online Vigilantism and Its Impact on Social Media

12th - Higher Ed
This video discusses the issue of online vigilantism in Singapore, focusing on two specific cases: SMRT feedback, an anonymous group accused of harassment, and Roads.sg, a website that exposes bad behavior on the roads. The video...
Instructional Video8:45
APMonitor

Python Import Online Data and Analyze

10th - Higher Ed
There are many online sources of data. Python is capable to access, parse, and display data from databases, data streams, or other sources. The Internet of Things (IoT) depends on devices and programs (such as Python) communicating with...
Instructional Video4:29
All In One Social Media

What Is Reputation Management? - Online Reputation Management 101

Higher Ed
What Is Reputation Management? - Online Reputation Management 101 // Your online reputation can be a huge asset and help drive you sales and referrals. It can also hurt you and harm your brand with poo reviews and feedback even if you...
Instructional Video10:57
AllTime 10s

10 False Memories Everyone Believes

12th - Higher Ed
Humpty Dumpty was your favourite childhood egg right? Well maybe not favourite, but he wasn't a bad egg. Wait? What?! He wasn't even an egg?!?! Well I never. Here are 10 more well I never false memories everyone believes.
Instructional Video11:37
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Weak Configurations

Higher Ed
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be...