Instructional Video1:24
Curated Video

Hamlet 2.2 The Play Within the Play

6th - Higher Ed
This video explores a pivotal moment in Act 2, Scene 2 of Shakespeare's "Hamlet," where Hamlet devises a plan to confirm Claudius's guilt through a theatrical performance. It delves into the historical context of the era, explaining how...
Instructional Video7:29
PBS

Bunyip: Australia’s Mysterious Amphibian Monster

9th - Higher Ed
Originating in the stories and beliefs of the southeastern Indigenous peoples of Australia, accounts of the bunyip are widely varied. This episode uses Aboriginal stories, historical records, and fossils to explore the bunyip legend, and...
Instructional Video9:59
PBS

Slender Man: How The Internet Created a Monster

9th - Higher Ed
Dr. Zarka explains the timeline of this Internet folklore sensation, examining how unlike so many other monster origins stories, we know exactly when and why this one was created. From Creepypasta to video games, horror movies to...
Instructional Video5:08
Curated Video

Account Management: What is Account-based Selling?

10th - Higher Ed
A lot of business-to-business selling is strategic. It is not a one-off or tactical endeavor. It is likely that you will want to maintain and build your relationships over the months and years to come. Managing this ongoing relationship...
Instructional Video2:44
Financial Times

Can we solve the peat predicament?

Higher Ed
FT Food Revolution - Peatlands make up about 3 per cent of the world’s land but hold a lot of carbon. But peat is also good for growing crops. That means draining the land, which then starts to release its carbon. Better peat management...
Instructional Video3:05
Financial Times

Welcome to the era of the activist accountant

Higher Ed
Accountants turned activists? In an unexpected modern tale, activist accountants have become vital advocates towards standardising ESG risks.
Instructional Video5:31
Curated Video

AWS, JavaScript, React - Deploy Web Apps on the Cloud - IAM Authentication and Security

Higher Ed
In this lesson, we will expand on our earlier discussion about IAM authentication and security on how authentication works.
Instructional Video6:07
Curated Video

Facial Reconstructions of Richard III & the Princes in the Tower | Mini Documentary | Royalty Now

Pre-K - Higher Ed
The story of Richard III and the Princes in the Tower is one of the notorious mysteries in English history. Was Richard a tyrant who killed his nephews, or an innocent, believing he was simply the best candidate to take the throne?...
Instructional Video3:07
Curated Video

Does Water Expand When It Freezes?

Pre-K - Higher Ed
Yes, water expands when it freezes. Note that the word “expands” here indicates an increase in volume. So, a technically sound way to put it would be—water’s volume increases when it freezes. This statement is accurate, and you can test...
Instructional Video10:31
Weird History

Benito Mussolinis Favorite Mistress

12th - Higher Ed
Italian dictator Benito Mussolini maintained relationships with several mistresses – as many as 14 at a time, according to some – but none stuck by him quite as ardently as Clara Petacci. Petacci, his preferred paramour, kept a diary...
Instructional Video2:55
Curated Video

ChatGPT Voice-Powered Chatbot Build with React and FastAPI - Setting Up Environment Variables

Higher Ed
In this video, we will show you how to set up environment variables to store your sensitive data securely and keep them out of your code. This clip is from the chapter "Environment Setup - Frontend and Backend" of the series "ChatGPT...
Instructional Video1:49
The Business Professor

Lapping Scheme

Higher Ed
A lapping scheme is a form of accounting fraud whereby stolen or misappropriated cash is obscured by an employee who altes the accounts receivable.
Instructional Video1:23
Curated Video

PHISH: Practicing Good Email and Sign-in Hygiene

Pre-K - Higher Ed
Explore the daily routines that create a resilient barrier against cyber threats. This video covers best practices such as crafting strong and unique passwords, enabling two-factor authentication, and logging out when accounts are not in...
Instructional Video4:18
Curated Video

SkillSprints: Identity Theft

Pre-K - Higher Ed
Every day thousands of people have their identitiy stolen. Often, that theft occurs due to poor digital skills. In this video, learn what you can do to prevent online identity theft.
Instructional Video3:51
Curated Video

SkillSprints: Understanding and Preventing Phishing Emails

Pre-K - Higher Ed
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Instructional Video2:39
Curated Video

SkillSprints: Building Good Log-on and Log-off Habits

Pre-K - Higher Ed
Good log on and log off habits are part of building strong cybersecurity. In this video, you'll learn how to improve your log-on and log-off habits and better protect yourself online.
Instructional Video5:52
PBS

How to Build Credit from Scratch!

12th - Higher Ed
Building a credit history without a credit history can feel like a Catch-22, but we've got some strategies that can open the doors!
Instructional Video8:53
The Business Professor

Steps in Selling a Business

Higher Ed
What are the Steps in Selling a Business?
Instructional Video2:05
MarketWatch

What is a high-yield savings account and should you use one?

Higher Ed
High-yield savings accounts offer much higher interests than traditional savings accounts. But there are some risks to consider.
Instructional Video5:55
Curated Video

MAC OS: Using Apple Mail

Pre-K - Higher Ed
Learner will now understand how to launch the native mail app, connect any third-party account to it and understand some key features offered in the application
Instructional Video2:23
Curated Video

Little Bighorn: The Only Survivor

9th - Higher Ed
The Battle of Little Bighorn, or Custer’s Last Stand, is infamous for having left no survivors. So what are we to make of Frank Finkel’s story, that only he lived to tell the tale?
Instructional Video3:46
Vlogbrothers

They Hacked Me

6th - 11th
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Instructional Video8:19
All In One Social Media

How To Find Trending Sounds On TikTok For Your Business

Higher Ed
TikTok success starts with the perfect sound, but how do you know which ones are trending? Will work best for you? Will help you go viral? In this video, learn how to find trending sounds on TikTok to help your business go viral with...
Instructional Video18:36
All In One Social Media

Unlocking the Secrets to Using TikTok on Your Desktop in 2023!

Higher Ed
In this video, we're going to show you how to use TikTok on desktop. TikTok is a popular social media app that lets you create and share videos for your business. In this guide, we'll teach you all about how to use TikTok on desktop....