Curated Video
IELTS Speaking Part 1 Sample Answers: Letters and Cards
Today you’ll hear sample answers for the IELTS Part 1 questions about letters and cards.
Mazz Media
Internet Safety- Know Who You're Talking To
This program reminds students to make smart decisions when giving out information on the internet. Viewers will become aware that advertisers, scammers and criminals lurk online attempting to get people to share their personal information.
Rachel's English
How to Pronounce English
The word ENGLISH is a tricky word: you have an NG sound AND a hard G!
Curated Video
Bash Shell Scripting- Introduction to the course
This video provides an overview of what to expect from the course. This clip is from the chapter "Introduction" of the series "Complete Bash Shell Scripting".This section introduces you to the course and helps you with the installation...
Curated Video
Excel VBA Programming The Complete Guide - Objects as Properties
It's easy to see object properties as simple, static data values -- integers, floating point numbers, or strings. However, object properties can also store other objects, complete with their own distinct properties and methods. In this...
Curated Video
Excel VBA Programming The Complete Guide - Introduction
We discuss the benefits offered by the technology, the tools and features available in VBA, a brief history of the language including its precursors Basic and Visual Basic and the prerequisites for the course. This clip is from the...
TLDR News
Results in the Swing States Explained: Has Trump “Already Won” the Election? - TLDR News
Anyone who wanted to get a clear answer to the Presidential Election will not have enjoyed the last 12 hours. As results have come in it’s become clear that a result might not be known for a while. Trump falsely claimed to have won the...
Englishing
PHRASAL VERBS (Verb + particle / separable or inseparable / get + adjectives or participle)
Phrasal verbs are an important part of the English Lexicon. They are actually used in everyday English conversations and informal writing. In this lesson, Mr. P./Marc will delve into this part of English vocabulary. He will explain the...
Curated Video
.NET Core Microservices - DbContext for Identity Server
This video explains the DbContext for identity server. This clip is from the chapter "Identity Server" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".In this section, you will learn about identity server.
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Social Engineering Red Flags
You will revisit, and discuss again, all the major social engineering red flags that you can spot in targeted phishing emails, texts and phone calls, as well as social engineering attacks in general. You will understand the main emotions...
XKA Digital
People remember how you make them feel
Rick started his business career as a graduate engineer in Electronics but quickly moved into the corporate world of sales. In 2004, he developed a fashion and lifestyle brand called Joystick Junkies and took the brand from making'dodgy'...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Personnel safety
CISSP Domain 3: System Architecture and Engineering: Personnel safety. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Curated Video
Active Directory with Windows Server 2016 - Introduction to RMS
Right Management Services (RMS) is a cross-application file security management solution that can be executed with AD. RMS implements security on information regardless of location. This clip is from the chapter "Implement Identity...
Tarver Academy
HOW TO MARK EMAILS AS UNREAD ON IPHONE
In This Episode, Tyler Teaches Us About HOW TO MARK EMAILS AS UNREAD ON IPHONE
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Trust Models
Web of trust is a mostly outdated method of proving identities, however it is helpful to understand as the predecessor of Public Key Infrastructure (PKI) which is widely used today. This clip is from the chapter "Cryptography" of the...
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 10 - Java Inheritance - Exercise - Student and Employee Classes
In this session, we will learn about Java inheritance - exercise - student and employee classes. This clip is from the chapter "Object-Oriented Programming Again" of the series "Java Programming for Complete Beginners - Java 16".In this...
Curated Video
IELTS Energy Podcast 991: Don't Count Words on IELTS Writing!
IELTS Energy Podcast 991: Don't Count Words on IELTS Writing!
IDG TECHtalk
iPhone privacy settings still allow apps to track users, plus how Android's privacy measures compare
Last week, The Washington Post revealed that, despite update app tracking transparency measures, iPhone apps continue to track users. This presents a serious privacy issue, since the type of data gathered about a user's device could be...
IDG TECHtalk
Setting up DLP features for email
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
XKA Digital
Keep your team focused
Rick started his business career as a graduate engineer in Electronics but quickly moved into the corporate world of sales. In 2004, he developed a fashion and lifestyle brand called Joystick Junkies and took the brand from making...
Science360
Herb, the Robotic Butler - Science Nation
His name is HERB and he's a robotic butler designed to open doors, clean tables and even retrieve your slippers. He doesn't look as human as his Japanese counterparts but HERB has a bigger brain according to its developer Siddhartha...
60 Second Histories
Anglo Saxon armour & weapons
A thegn warrior, serving King Athestan, describes the armour he wears and his weapons, such as the kite shield and battle axe.
Curated Video
Bash Shell Scripting- Shell Script to send Automatic Mail Alert when RAM Memory gets Low
This video shows how to write a shell script that sends an automatic mail alert when the RAM memory gets low. This clip is from the chapter "Scheduling jobs with at and crontab" of the series "Complete Bash Shell Scripting".This section...
IDG TECHtalk
Boeing's insecure networks threaten security and safety
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals...