Hi, what do you want to do?
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - Virtual Machine V-Lab
In this video, we will look at Virtual Machine V-lab.
r/>
This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and creating...
r/>
This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and creating...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Working with Security Groups Lab
This video demonstrates how to control who has access to the Amazon EC2 instances that you implement with the help of security groups.
r/>
This clip is from the chapter "Solutions Architect Chapter 6 - Compute Services...
r/>
This clip is from the chapter "Solutions Architect Chapter 6 - Compute Services...
Curated Video
Data Science Model Deployments and Cloud Computing on GCP - Lab - Data Validation Using App Engine
In this lab video, we will explore how to use Google App Engine to perform data validation on user input.
<
br/>
This clip is from the chapter "Data Science Models with Google App Engine" of the series "Data Science Model...
<
br/>
This clip is from the chapter "Data Science Models with Google App Engine" of the series "Data Science Model...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Setting up an Amazon Elastic Compute Cloud (Amazon EC2) Windows Instance Lab
This video provides a demonstration of how to instantiate a Windows instance in Amazon Web Services (AWS).
r/>
This clip is from the chapter "Solutions Architect Chapter 5 - Compute Services Implementation" of the series "AWS...
r/>
This clip is from the chapter "Solutions Architect Chapter 5 - Compute Services Implementation" of the series "AWS...
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Working with Security Groups
This video focuses on access control to Amazon Elastic Compute Cloud (Amazon EC2) instances that you implement with the help of security groups.
r/>
This clip is from the chapter "Solutions Architect Chapter 6 - Compute...
r/>
This clip is from the chapter "Solutions Architect Chapter 6 - Compute...
Curated Video
What Is the Metaverse and Is It Scientifically Valuable?
What is the Metaverse? Just like metaphysics is concepts beyond real physics, the metaverse is a world beyond the physical universe. The world "metaverse" was coined about 30 years ago, by sci-fi author Neal Stephenson in...
Curated Video
AWS Certified Cloud Practitioner (CLF-C02) - Ultimate Exam Training - Configuring S3 Cross-Region Replication
In this video, you will learn about configuring S3 cross-region replication.
Crash Course
Educational Technology: Crash Course Computer Science #39
Every minute, users upload 400 hours of video to YouTube, which is how the resource became available. From MOOCs to AI driven intelligent tutoring systems, an engaging video explains how technology has changed the world of education. It...
Curated OER
Internet Safety Rules
Remember to be safe while on the Internet with the fantastic tips from this informative video. This is a great video to watch prior to introducing your students to the computer lab.
Real Engineering
Area Rule: How to Make Planes Fly Faster
It's a bird, it's a plane, it's a modern aircraft with cross-sectional areas taken into consideration. A short video in the Real Engineering playlist describes how cross-sectional areas of airplanes relate to their speeds. It shows...
PBS
Rehnquist’s Views on the Miranda Decision
Scholars learn about William Rehnquist's views on government interference in local police and some of his other Supreme Court rulings, including Dickerson v. The United States, by watching the video. Learners also read background...
Crash Course Kids
Bowled Over - Isolating Variables
Through a captivating game of bowling and Slingshot Catbot, this video gives future engineers insight into the testing solutions part of the engineering process. It includes setting rules, isolating variables, and checking to see if...
Code.org
Star Wars: Building a Galaxy with Code
Welcome to the code side. The interactive lesson introduces coding in a game format with familiar characters. Young computer experts learn to develop code to control the interaction of the characters in the game. The activity ends with...
Khan Academy
What is Inside a Hair Dryer? (1 of 2), Electrical Engineering
Discover the safety features in a hair dryer's plug. In the first of two videos on hair dryers, viewers watch as the plug for a hair dryer is taken apart. The video explains how a ground fault interrupt circuit in the plug works.
Crash Course
Early Computing: Crash Course Computer Science #1
A generation brought up with computers probably can't imagine a world without them. The first video in the series explains advances in early computing. From the abacus to tabulating machines, individuals see how computations were made...
GCFGlobal.org
Excel 2016: Conditional Formatting
Under what conditions should people use conditional formatting in Excel? Using video 22 of 27 in the Microsoft Excel 2016 educational series, pupils learn how to use the conditional formatting command. Scholars discover how to use data...
Khan Academy
What is Inside a Coffee Maker?, Reverse Engineering, Electrical Engineering
You'll never look at your coffee maker the same way again after viewing a video on reverse engineering that shows the components inside a coffee maker. The narrator explains how each part was made, what material it is made from, and how...
PBS
Why We Fight
How does propaganda change history? Scholars research the use of WWII movies to launch America into the postwar boom in the United States. They view a short video clip and discuss the impact American patriotism has on society, Supreme...
TED Talks
The Incredible Inventions of Intuitive AI
Welcome to the Augmented Age. Futurist Maurice Conti introduces viewers to his predictions of what to expect from the Augmented Age, an age of computers and robotic systems that work with humans to imagine, design, and build all sorts of...
Khan Academy
Finding the Greatest Common Factor of Two Monomials, Algebra I
Sal explains that the most significant common factor of any number is the largest number divisible into both monomials and not necessarily the number with the most significant value. He breaks down two numbers into their prime factors as...
PBS
Pbs Learning Media: Are Computers Intelligent?
Learn how computers can be programmed to beat the greatest human chess masters. Computers can use their understanding of the rules of chess to plan many more moves ahead than humans can. But when computers bring that kind of...