IDG TECHtalk
Can the iPad Pro replace the MacBook as an enterprise device?
On this episode of Today in Tech, Computerworld executive editor Ken Mingis and Macworld writer Michael Simon join Juliet to debate whether or not the iPad Pro is a practical enterprise device. Can the iPad Pro ever replace a traditional...
Easy Languages
Easy Croatian 14 - How do you feel about digital media?
Easy Croatian 14 - How do you feel about digital media? Easy Languages is an international video project aiming at supporting people worldwide to learn languages through authentic street interviews and expose the street culture of...
IDG TECHtalk
What security and IT admins need to know about Microsoft Threat Protection
Microsoft Threat Protection can help admins monitor and secure much of a Windows network, but licensing requirements are confusing.
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Create a Billing Alarm
In this video, we'll learn how to create a billing alarm. This clip is from the chapter "Introduction to AWS Certified Cloud Practitioner CLF-C01 and Cloud Computing" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for...
Curated Video
Bash Shell Scripting- Monitor File system usage and send mail alerts
This video shows how to Monitor File system usage and send mail alerts. This clip is from the chapter "Real-Time Practice (Low level to High level)" of the series "Complete Bash Shell Scripting".This section covers various Bash shell...
Packt
User Register Reducer, Action, and Screen
This video focuses on user register reducer, action, and screen. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication...
Packt
Profile Screen and Getting User Details
This video focuses on the profile screen and explains how to acquire user details. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Matching an Author's Email against a Regular Expression
This video demonstrates how to match an author's email against a regular expression. This clip is from the chapter "GitHub Hooks" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains GitHub hooks...
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 07 - Understanding Inheritance - Why Do We Need It?
In this session, we will understand inheritance - why we need it. This clip is from the chapter "Object-Oriented Programming Again" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will revert to OOP...
Curated Video
Frontend Web Development Bootcamp - Build a Twitter Clone - Forms - Part 1
HTML Crash Course: Forms - Part 1 This clip is from the chapter "HTML Crash Course" of the series "Frontend Web Development Bootcamp: Build a Twitter Clone".This section explains about HTML, Headings, Paragraphs, Lists, Links and so on.
Curated Video
DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Jenkins Plugin Basic
In this video, you will be able to install the plugins and do basic configuration. This clip is from the chapter "Continuous Integration and Continuous Deploy" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK,...
The March of Time
Rockefeller Center mail
MOT 1937: ROCKEFELLER CENTER MAIL: (POV behind) Mail clerk man delivering mail to Rockefeller Foundation executive offices African-American receptionist. CU Letters envelopes being sorted addressed to John D. Rockefeller. New York City NYC
Science360
Ultimate sacrifice - Spider's post-sex cannibalism aids offspring
In this spooktacular episode, Jordan and Charlie explore the male dark fishing spider’s ultimate sacrifice. This death wish probably evolved to benefit his offspring, which grow nearly 20 percent larger, and survive about 50 percent...
Packt
Updating User Profile
This video shows how to update the user profile. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication and profile.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Certificates and Trust
This video explains the various certificates and how they are used to establish trust. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Applying Domain Name System (DNS)
This video explains how to work with DNS and discusses the various record types that are available, what their purpose is, and how they can be used. This clip is from the chapter "Network Naming" of the series "CompTIA Network+...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Creating a GitHub Account
This video demonstrates the process of creating a GitHub account. This clip is from the chapter "GitHub and Remote Repositories" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains Git hosting...
Curated Video
World of Computer Networking Your CCNA start - Applications and Protocols
This video introduces you to the basic protocols for applications. This clip is from the chapter "Transmission Control Protocol/Internet Protocol (TCP/IP) and Open Systems Interconnection (OSI) Models" of the series "World of Computer...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Benefits of a Risk Register
This video explains the benefits of a risk register. This clip is from the chapter "Risk Register" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the risk register.
Curated Video
The Full Stack Web Development - JobLister Project
Backend Programming with PHP: JobLister Project This clip is from the chapter "Backend Programming with PHP" of the series "The Full Stack Web Development".Here, we talk about all the basics of PHP and move on to OOP, integrate MySQL,...
IDG TECHtalk
How to disable basic or legacy authentication to set up MFA in Office 365
Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.
Packt
Update Profile Endpoint
This video shows how to update the profile endpoint. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication and profile.
Packt
Admin User List
This video focuses on the admin user list. This clip is from the chapter "Admin Screens-Part 1" of the series "MERN E-commerce from Scratch".This is the first part of a two-part section that explores the admin screen.
Curated Video
AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Cloud Computing Models
This video explains how to use cloud computing and some of its terminologies, such as IaaS, PaaS, and SaaS. This clip is from the chapter "Solutions Architect Chapter 1 - Amazon Web Services (AWS) Cloud Services Overview" of the series...