Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - (Exercise) Amazon Machine Learning, Part 2
This video is the second part of the two-part video that explains how to predict order quantities with a linear regression from Amazon machine learning. This clip is from the chapter "Appendix - Machine Learning Topics for the Legacy AWS...
Sustainable Business Consulting
5 Steps to Getting Management Support
Explore 5 key areas where sustainability programs require management support and ways to calculating a simple carbon footprint. Explore lessons learned from helping numerous clients with their sustainability programs including obstacles...
Healthcare Triage
Ebola in America and Placebos Work! Healthcare Triage News
A few more patients are cured of Ebola in the US, and placebos can help kids with the cold. This is Healthcare Triage News.
Nature League
Can Cannabis Help Mental Illness? - De-Natured
In this De-Natured segment of Nature League, Brit breaks down a recent scientific journal article about the effect of cannabidiol on brain regions associated with psychosis. Article citation: Bhattacharyya S, Wilson R, Appiah-Kusi E, et...
Sustainable Business Consulting
Tools for Managing Sustainability Part 2
Discusses the third tool to use when managing for sustainability: GHG Inventory
Music Matters
Where to use Non-Chord Tones - Music Composition
This music composition lesson takes a simple passage and explains how you can spot obvious places in which to add non-chord tones. The video explains neighbour tones (auxiliary notes) and passing tones (passing notes) then goes on to...
Odd Quartet
How Style and Instrumentation Affect Chord Progressions
Today we will look at a chord progression, but we will look at it in two different ways. First, as an 18th century piano composition. Then, as a 1950s American dance music. The trick is that we will use the same chord progression for...
Sustainable Business Consulting
Six Key Fundamentals to Sustainable Strategy
Learn what are the six key fundamentals in creating a sustainable strategy for a corporation. Sustainable initiatives can have unintended consequences, and see what to do to prevent such outcomes.
Music Matters
Fluid Basslines - Inside the Mind of Bach
Join us as we examine the choice of harmony, chromatic chords, secondary dominants, borrowed chords. and modulation, the part writing, the use of inessential notes and suspensions, plus other features of the Bach Chorale style. Useful...
Sustainable Business Consulting
Tools for Managing Sustainability Part 1
Discusses two out of three tools to use when managing for sustainability: SWOT Analysis and Gap Analysis
KnowMo
Solving 3D Problems using Pythagoras and Trigonometry
The video is an electric presentation on how to solve problems in 3D by breaking them down into their 2D components. The focus is on using Pythagoras and trigonometry to find missing lengths and angles. The presenter provides...
Music Matters
Is this the Greatest English Work of the 17th Century? - Composer Insights
The famous Dido’s Lament from ‘Dido and Aeneas’ by Henry Purcell. Features of Purcell’s style are unpacked and the word painting & emotional life of the music are explored. A Ground Bass is repeated 11 times, while the melodic line and...
Healthcare Triage
Reality Show Stars: They're Not Just Like Us
There's a lot of news this week touting a study that suggests exercise is the key to maintaining a weight loss. Welp. Guess what? It wasn't a great study. There were 14 participants, all of whom appeared on the TV reality show The...
Sustainable Business Consulting
Governance and Getting Started
Lays out the basic structure for implementing a green team and provides tips on how to maximize your efforts
Odd Quartet
How to Get From Chord To Chord - Voice Leading Music Theory
Today we're going to look at voice leading. Voice leading is a way to get from chord to chord in music that makes it sound connected (and can make it easier for musicians to play). First, we will take a chord progression, add a bass line...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Software development methodologies part 2
CISM Domain 1: Information Security Governance: Software development methodologies part 2 This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security...
Physical and Health Education
Tennis - Backhand technique
Teaching points for the backhand technique in the game of tennis.
IDG TECHtalk
Most common cyberattack techniques of 2020
Research on the most common techniques attackers used to breach systems provides insight on where to focus your defenses.
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Policies, procedures, guidelines, and frameworks
CISM Domain 1: Information Security Governance: Policies, procedures, guidelines, and frameworks This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information...
Curated Video
Apache Maven Beginner to Guru - Introduces you to the Maven basics
This video introduces you to the Maven basics. This clip is from the chapter "Maven Basics" of the series "Apache Maven: Beginner to Guru".This section focuses on the Maven basics, such as Maven coordinates, Maven repositories, and so on.
The Business Professor
Hawthorne Experiments
Dr. Kyle Huff explains what are the Hawthorne Experiments
Music Matters
Writing Counterpoint - Combining Counterpoint with Harmony
Learn how to write and compose counterpoint combined with homophony. Counterpoint is an advanced music composition technique that involves weaving together multiple melody lines. Working in a Baroque style, this video demonstrates how...
Sustainable Business Consulting
Six Fundamentals to Sustainability Strategy
Describes the six fundamentals to integrating sustainability throughout your company
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance. This clip is from the chapter "Tools of the Trade" of the...