Curated Video
routing protocols : How does a router route when told conflicting information?
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How does a router route when told...
IDG TECHtalk
How robotics (and AI) are changing how we work and live | TECH(talk)
Robotics and AI play increasingly important roles in a variety of industries and no, they're not here to take over mankind. Keith Shaw, editor-in-chief of Robotics Business Review, joins Ken Mingis and Juliet Beauchamp to discuss the...
IDG TECHtalk
Coronavirus, working from home and your home Wi-Fi network
Due to concerns around the coronavirus and COVID-19, you might be working from home. We are, too! On today’s first remote episode of Today in Tech, Juliet discusses if your home Wi-Fi network will be able to handle a huge spike in...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Other Layer 2 Attacks
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP. This clip is...
IDG TECHtalk
Boeing's insecure networks threaten security and safety
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals...
Curated Video
AZ-204 Developing for Microsoft Azure Exam Prep - Scaling a Single Virtual Machine
This video shows how to scale a single virtual machine. This clip is from the chapter "AZ-204 Scaling Applications and Services" of the series "AZ-204 Developing for Microsoft Azure Exam Prep".This section explains how to scale AZ-204...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Azure Traffic Manager Profiles
In this video, we will cover Azure traffic manager profiles. This clip is from the chapter "Network Traffic Management" of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn network traffic management and load balancer...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Virtualization
CISSP Domain 3: System Architecture and Engineering: Virtualization. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
IDG TECHtalk
Best practices for secure work-from-home VPN connections
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Traffic Manager: Performance Routing
In this video, we will cover traffic manager: performance routing. This clip is from the chapter "Network Traffic Management" of the series "AZ-104: Microsoft Azure Administrator Full Course".Learn network traffic management and load...
Institute for New Economic Thinking
Frank Kelly - Networks and Systemic Risk
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risk
Curated Video
How Traffic Lights Work
Traffic lights are essential for directing the flow of vehicular and pedestrian traffic. They typically have three colored lights - green for go, red for stop, and yellow for slow down. Traffic lights can be controlled through fixed rate...
Curated Video
CISSP®- IAAA - Part 1- Identification, Authentication, Authorization, and Accountability
This is the first part of a two-part video that explains the concept of IAAA. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Amazon Route53 and DNS
In this video, we'll learn about Amazon Route53 and DNS. This clip is from the chapter "Amazon Route53" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about Amazon Route53 and DNS.
Curated Video
CISSP®- Information Security Governance: Policies, Procedures, Guidelines, and Frameworks
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - IP Security (IPsec)
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel. This clip is from the chapter...
Curated Video
High scoring Vocabulary Describing Road Conditions
Today you’ll learn high-scoring vocabulary describing road conditions, useful for both Speaking and Writing. Questions about road conditions could definitely be seen on your next IELTS Exam- anywhere in the Speaking Exam, in Writing Task...
Curated Video
SSL Complete Guide 2021: HTTP to HTTPS - Section Introduction - Introduction to HTTPS and TLS
In this video, we'll first take a quick look at what we'll cover in this section. This clip is from the chapter "Introduction to HTTPS and TLS" of the series "SSL Complete Guide 2021: HTTP to HTTPS".This section will give you an overview...
The March of Time
1952: ROUTE CONTROL CENTER: Correspondent David Brinkley in radar room at Washington National Airport w/ CAA radar expert James Richey, SOT explaining what happened Saturday night, UFO sighting, light no aircraft, TD MS Radar screen.
MOT 1952: ROUTE CONTROL CENTER: Correspondent David Brinkley in radar room at Washington National Airport w/ CAA radar expert James Richey, SOT explaining what happened Saturday night, UFO sighting, light no aircraft, TD MS Radar screen.
IDG TECHtalk
How to securely set up split-tunnel VPNs
Some organizations are setting up split-tunnel virtual private networks to allow remote workers to connect to a Windows network. Follow these steps to minimize security risks.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 7 Exam Question Review
Malicious users will often mimic legitimate services in an attempt to trick unsuspecting victims into connecting to the service. This episode presents a scenario where the viewer must determine what type of attack has taken place. This...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 6 Exam Question Review
Address Resolution Protocol (ARP) is used by the TCP/IP protocol suite. This episode discussed ARP poisoning attacks and potential mitigations. This clip is from the chapter "The Basic LAN" of the series "CompTIA Security+ Certification...
Packt
How can Java Classes Take Advantage of Interfaces?
This video explains how Java classes can take advantage of interfaces. This clip is from the chapter "Java Object Oriented Programming System (OOPS) Basic for Selenium Part - 1" of the series "Selenium WebDriver with Java - Basics to...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Using tcpdump to Analyze Network Traffic
tcpdump is a built-in Unix and Linux command-line tool that can capture, analyze, filter, and save captured network packets. This clip is from the chapter "Tools of the Trade" of the series "CompTIA Security+ Certification SY0-601: The...