Curated Video
Modern Web Design with HTML5, CSS3, and JavaScript - Making Links with the HTML Anchor Tag
This video demonstrates how to make links with the HTML anchor tag. This clip is from the chapter "Creating Web Pages with HTML5" of the series "Modern Web Design with HTML5, CSS3, and JavaScript".This section demonstrates how to create...
Curated Video
How to Analyze a Cyber Attack
Traditional information security attack analysis focuses on malware and computer intrusions, in which an attacker utilizes technical prowess to exploit a vulnerability to gain access to or harm a system (or network).
Curated Video
Introduction to IT and Cybersecurity: Web Infrastructure
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...
Curated Video
Email Security
This video will guide you on how to setup your email for optimal security in addition to tips on how to prevent malicious emails
Let's Tute
The Mind-Blowing Concept of Infinity Explained
This video explores the concept of Infinity and how it is not a number but a representation of the size of a never-ending number line. It delves into countable and uncountable infinities, and even touches on the practical applications of...
Curated Video
What is Plagiarism and How Do I Avoid it?
In this video, I will explain plagiarism and how to avoid it! I will go through every example of plagiarism that I have seen as a teacher. Also, I feel like there are certain ideas NO ONE is talking about when it comes to plagiarism so I...
Bill Carmody
Reputation Management: Attract, Engage, Capture, Convert, Retain
In this video, Bill Carmody interviews Elizabeth Engen, an expert in reputation management and SEO. They discuss the importance of managing your online reputation and offer tips on how to attract and retain customers through effective...
Curated Video
Apache Kafka - Real-time Stream Processing (Master Class) - Emergence of Bigdata - A Quick Recap
This is the first lecture of this course that talks about some history, from where we started, and where are we going with the data processing. Here, you will learn about the Big Data problem and how it started. This lesson will...
Curated Video
UX Design for Web Developers (Video 21)
User experience (UX) design is a theoretical understanding of how users interact with websites. The major challenge developers building a company website face is finding the right balance that fulfills the objectives of the company as...
The Wall Street Journal
Kai-Fu Lee on the Future of AI and Enterprise Tech
Kai-Fu Lee, founder and CEO of Sinovation Ventures on where AI trendlines head next, and how AI will be applied to enterprise.
All In One Social Media
Content Marketing Strategies For Small Businesses
Creating content marketing strategies for small businesses can be really overwhelming for any business owner. As a business owner, you are good at what you do and that usually does not include marketing. In this video, I will map out...
Tarver Academy
How to Insert Text, Shapes, and Lines in GOOGLE SLIDES
In This Episode, Tyler Teaches Us About How to Insert Text, Shapes, and Lines in GOOGLE SLIDES
AllTime 10s
10 Obscure Companies That Could Dominate The World In 10 Years
Every company starts somewhere, even Apple and Google were once just tiny startups! No one knows what the future holds, but these 10 businesses could be topping the global ladder in a decade's time - and changing the world while they're...
Mr. Beat
Why Are There So Many Springfields?
If you are watching this video right now, and you are an American, there is a very good chance that you live in Springfield. Congratulations! You live in the same city as The Simpsons! Or do you? If you Google "Most Common American City...
Tarver Academy
Be able to spot a scam or hoax online - DIGITAL CITIZENSHIP
In This Episode, Tyler Teaches Us About How to Be able to spot a scam or hoax online - DIGITAL CITIZENSHIP
Science360
The value of social, behavioral and economic sciences
The National Science Foundation's Social, Behavioral, and Economic Sciences (SBE) directorate supports a wide range of research in the social, behavioral and economic sciences that investigates questions about people and our world. The...
Curated Video
Deep Learning with Python (Video 17)
Deep learning is currently one of the best providers of solutions regarding problems in image recognition, speech recognition, object recognition, and natural language with its increasing number of libraries that are available in Python....
TLDR News
Are Conservatives Silenced By Social Media? Trump's Twitter, Shadow Bans & Algorithms - TLDR News
In the last week an old conversation about social media fairness as reignited, with those on the right claiming that their views are being suppressed by social media. So in this video, we investigate the claim and discover whether the...
The Art Assignment
Do Machines Make Art? | The Art Assignment | PBS Digital Studios
When art is generated by Artificial Intelligence, what or who can we call the artist? We look to art history to consider the long collaboration between humans and technology.
Science360
A lifetime of building learning communities
James Duderstadt has always considered himself a change agent. It might sound odd, when you consider that he’s spent nearly 50 years at one institution. Look a bit closer, however, and you quickly see what he means: Duderstadt, a...
National Institute of Standards and Technology
Keynote Remarks of Vivek Kundra - U.S. Chief Information Officer
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workship II November 4-5, 2010 to update government and industry stakeholders on developing cloud standards. Federal CIO Vivek Kundra...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO). This clip is...
The Business Professor
SERM, Search Engine Reputation Management
Explanation of SERM, Search Engine Reputation Management
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Penetration Testing
This episode focuses on how penetration testing discovers and exploits security vulnerabilities. Concepts covered include known, partially known, and unknown testing types as well as the role that red, white, blue, and purple teams play....