Instructional Video4:38
TED-Ed

TED-Ed: Why did the British Empire burn, sink, and hide these documents? | Audra A. Diptée

Pre-K - Higher Ed
In 2009, five Kenyan people took a petition to the British Prime Minister. They claimed they endured human rights abuses in the 1950s, while Kenya was under British colonial rule, and demanded reparations. They had no documentary...
Instructional Video14:55
TED Talks

TED: The secret US prisons you've never heard of before | Will Potter

12th - Higher Ed
Investigative journalist Will Potter is the only reporter who has been inside a Communications Management unit, or CMu, within a uS prison. These units were opened secretly, and radically alter how prisoners are treated -- even...
Instructional Video8:18
TED Talks

Christopher Soghoian: Government surveillance — this is just the beginning

12th - Higher Ed
Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology...
Instructional Video4:55
SciShow

Uncovering the Secrets of the Past with AI

12th - Higher Ed
It’s probably not a surprise that many ancient texts are a bit worn out and tattered, and that makes deciphering what they say quite a task. But with new computer tech and artificial intelligence, we are getting much clearer glimpses of...
Instructional Video16:39
TED Talks

Keren Elazari: Hackers: the Internet's immune system

12th - Higher Ed
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing...
Instructional Video3:39
Curated Video

Access Anything, Anywhere with Cloud Storage

Pre-K - Higher Ed
Need to access your files from anywhere at any time? Discover how cloud storage can transform the way you handle documents with our latest Skill Sprints video. Learn how to store, share, and collaborate on files using popular cloud...
Instructional Video14:13
Curated Video

Oldest Qur'an Manuscripts

6th - Higher Ed
Oldest Qur'an Manuscripts
Instructional Video2:03
Curated Video

Introducing Blinks: The Next Generation Search Engine

Pre-K - Higher Ed
Blinks is a revolutionary search engine that goes beyond traditional keyword searches. It automatically compiles suggestions based on the documents you read and write, searching not only the Internet but also your own computer files and...
Instructional Video4:49
Let's Tute

Maintaining Property Documents and Helpline Numbers

9th - Higher Ed
In this session we are going to understand the How to maintain property documents and Importance of safeguarding property documents and the Types of Property documents and the different way of maintaing records of helpline numbers. So we...
Instructional Video10:27
Curated Video

Project Portfolio Management: How to Craft a Portfolio in 5 Steps

10th - Higher Ed
A strategic portfolio of programs, projects, and initiatives has balance and delivers value. But how do you assemble a strategic project portfolio? I want to share with you a simple five-step Project Portfolio Management approach I...
Instructional Video15:24
Curated Video

Project Management Job Interview - How to Crack it!

10th - Higher Ed
Do you want to succeed in your next project management job interview? Here, project management expert, Dr Mike Clayton, will give you his top interview tips for how to crack your next project management interview. In this video, you'll...
Instructional Video6:06
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Stylometry

Higher Ed
This video illustrates an application called Stylometry, which can determine if an anonymous document may or may not have been written by us.
Instructional Video10:21
Curated Video

Practical Cyber Hacking Skills for Beginners - Calculating Hash Values with PowerShell

Higher Ed
In this video, you will learn about calculating the hash values of different types of files using Microsoft PowerShell.
Instructional Video9:59
Curated Video

Practical Cyber Hacking Skills for Beginners - Linux Commands

Higher Ed
Here, we will look at the basic Linux commands to help us operate the Kali Linux system.
Instructional Video2:17
Food Farmer Earth

Advancing Sustainability: The Impact of Certification in Wine Production

12th - Higher Ed
Discover how sustainable wine certification programs are shaping the future of vineyard management. Learn about the principles of low input viticulture and the benefits of ecosystem-focused farming.
Instructional Video2:17
Food Farmer Earth

Maximize Your Growing Season: Essential Garden Planning Tips for High School and College Students

12th - Higher Ed
Discover practical garden planning strategies to maximize yield throughout the growing season. This guide presented by an Oregon State University Extension Service Community and Urban Horticulturist, covers early to late season planting,...
Instructional Video1:27
Curated Video

The Front-End Web Developer Bootcamp - HTML, CSS, JS, and React - Features of HTML5

Higher Ed
In this video, we will explore the powerful features of HTML5, such as semantic tags, audio and video support, form enhancements, and canvas for graphics. You will learn how these features improve the user experience and make web...
Instructional Video7:38
Curated Video

Vue.js 3 and Firebase for Beginners - Adding Users

Higher Ed
This video explains how to add new users to the website who can access the entire website. We need to set up a way to allow only authorized admin users into the admin section. We will do this using custom claims. This clip is from the...
Instructional Video9:18
Curated Video

Vue.js 3 and Firebase for Beginners - Getting Pizzas

Higher Ed
This video explains how to get pizzas using the async function, getPizza, and calling the import function called getDocs. This clip is from the chapter "Firebase Setup and Firestore" of the series "Vue.js 3 and Firebase for...
Instructional Video4:26
Curated Video

The Absolute Beginners Guide to Cybersecurity 2023 - Part 4 - Backups

Higher Ed
In this video, you will learn about backups and how to make backups for your computer or files. The author also shares some tips on how to best use your backups. This clip is from the chapter "Personal Security" of the series "The...
Instructional Video6:59
Curated Video

AWS Certified Solutions Architect Associate (SAA-C03) - Data Security Policies

Higher Ed
It would be remiss to discuss database design without addressing policies. We discussed security in general earlier and now will explain why policies are important.
Instructional Video6:13
Curated Video

CompTIA A+ Certification Core 2 (220-1102) - Introduction to Users and Groups

Higher Ed
The Microsoft NT File System (NTFS) enables fine control of multiple users accessing resources on a single computer. To do this, every person accessing a single computer must have their own user account. Windows also has groups that...
Instructional Video3:41
Curated Video

SQL Server Course for Beginners with 100+ examples - SQL Versus NoSQL

Higher Ed
Learn the difference between SQL and NoSQL. We have considered the example of MySQL (SQL-based) and MongoDB (NoSQL-based) to understand the concept. This clip is from the chapter "SQL Introduction" of the series "SQL Server Course for...
Instructional Video16:06
Curated Video

React JS Masterclass - Go From Zero To Job Ready - Create Blog Post / 167

Higher Ed
After creating the conditional authorization in the previous lesson, we will now create a blog post in the WriteNode application.