Curated Video
Hamlet 2.2 The Play Within the Play
This video explores a pivotal moment in Act 2, Scene 2 of Shakespeare's "Hamlet," where Hamlet devises a plan to confirm Claudius's guilt through a theatrical performance. It delves into the historical context of the era, explaining how...
PBS
Bunyip: Australia’s Mysterious Amphibian Monster
Originating in the stories and beliefs of the southeastern Indigenous peoples of Australia, accounts of the bunyip are widely varied. This episode uses Aboriginal stories, historical records, and fossils to explore the bunyip legend, and...
PBS
Slender Man: How The Internet Created a Monster
Dr. Zarka explains the timeline of this Internet folklore sensation, examining how unlike so many other monster origins stories, we know exactly when and why this one was created. From Creepypasta to video games, horror movies to...
Curated Video
Account Management: What is Account-based Selling?
A lot of business-to-business selling is strategic. It is not a one-off or tactical endeavor. It is likely that you will want to maintain and build your relationships over the months and years to come. Managing this ongoing relationship...
Financial Times
Can we solve the peat predicament?
FT Food Revolution - Peatlands make up about 3 per cent of the world’s land but hold a lot of carbon. But peat is also good for growing crops. That means draining the land, which then starts to release its carbon. Better peat management...
Financial Times
Welcome to the era of the activist accountant
Accountants turned activists? In an unexpected modern tale, activist accountants have become vital advocates towards standardising ESG risks.
Curated Video
AWS, JavaScript, React - Deploy Web Apps on the Cloud - IAM Authentication and Security
In this lesson, we will expand on our earlier discussion about IAM authentication and security on how authentication works.
Curated Video
Facial Reconstructions of Richard III & the Princes in the Tower | Mini Documentary | Royalty Now
The story of Richard III and the Princes in the Tower is one of the notorious mysteries in English history. Was Richard a tyrant who killed his nephews, or an innocent, believing he was simply the best candidate to take the throne?...
Curated Video
Does Water Expand When It Freezes?
Yes, water expands when it freezes. Note that the word “expands” here indicates an increase in volume. So, a technically sound way to put it would be—water’s volume increases when it freezes. This statement is accurate, and you can test...
Weird History
Benito Mussolinis Favorite Mistress
Italian dictator Benito Mussolini maintained relationships with several mistresses – as many as 14 at a time, according to some – but none stuck by him quite as ardently as Clara Petacci. Petacci, his preferred paramour, kept a diary...
Curated Video
ChatGPT Voice-Powered Chatbot Build with React and FastAPI - Setting Up Environment Variables
In this video, we will show you how to set up environment variables to store your sensitive data securely and keep them out of your code. This clip is from the chapter "Environment Setup - Frontend and Backend" of the series "ChatGPT...
The Business Professor
Lapping Scheme
A lapping scheme is a form of accounting fraud whereby stolen or misappropriated cash is obscured by an employee who altes the accounts receivable.
Curated Video
PHISH: Practicing Good Email and Sign-in Hygiene
Explore the daily routines that create a resilient barrier against cyber threats. This video covers best practices such as crafting strong and unique passwords, enabling two-factor authentication, and logging out when accounts are not in...
Curated Video
SkillSprints: Identity Theft
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Curated Video
SkillSprints: Understanding and Preventing Phishing Emails
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Curated Video
SkillSprints: Building Good Log-on and Log-off Habits
Good log on and log off habits are part of building strong cybersecurity. In this video, you'll learn how to improve your log-on and log-off habits and better protect yourself online.
PBS
How to Build Credit from Scratch!
Building a credit history without a credit history can feel like a Catch-22, but we've got some strategies that can open the doors!
MarketWatch
What is a high-yield savings account and should you use one?
High-yield savings accounts offer much higher interests than traditional savings accounts. But there are some risks to consider.
Curated Video
MAC OS: Using Apple Mail
Learner will now understand how to launch the native mail app, connect any third-party account to it and understand some key features offered in the application
Curated Video
Little Bighorn: The Only Survivor
The Battle of Little Bighorn, or Custer’s Last Stand, is infamous for having left no survivors. So what are we to make of Frank Finkel’s story, that only he lived to tell the tale?
Vlogbrothers
They Hacked Me
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
All In One Social Media
How To Find Trending Sounds On TikTok For Your Business
TikTok success starts with the perfect sound, but how do you know which ones are trending? Will work best for you? Will help you go viral? In this video, learn how to find trending sounds on TikTok to help your business go viral with...
All In One Social Media
Unlocking the Secrets to Using TikTok on Your Desktop in 2023!
In this video, we're going to show you how to use TikTok on desktop. TikTok is a popular social media app that lets you create and share videos for your business. In this guide, we'll teach you all about how to use TikTok on desktop....