Hi, what do you want to do?
IDG TECHtalk
iPhone privacy settings still allow apps to track users, plus how Android's privacy measures compare
Last week, The Washington Post revealed that, despite update app tracking transparency measures, iPhone apps continue to track users. This presents a serious privacy issue, since the type of data gathered about a user's device could be...
XKA Digital
Keep your team focused
Rick started his business career as a graduate engineer in Electronics but quickly moved into the corporate world of sales. In 2004, he developed a fashion and lifestyle brand called Joystick Junkies and took the brand from making...
Science360
Herb, the Robotic Butler - Science Nation
His name is HERB and he's a robotic butler designed to open doors, clean tables and even retrieve your slippers. He doesn't look as human as his Japanese counterparts but HERB has a bigger brain according to its developer Siddhartha...
60 Second Histories
Anglo Saxon armour & weapons
A thegn warrior, serving King Athestan, describes the armour he wears and his weapons, such as the kite shield and battle axe.
Curated Video
Bash Shell Scripting- Shell Script to send Automatic Mail Alert when RAM Memory gets Low
This video shows how to write a shell script that sends an automatic mail alert when the RAM memory gets low. This clip is from the chapter "Scheduling jobs with at and crontab" of the series "Complete Bash Shell Scripting".This section...
IDG TECHtalk
Boeing's insecure networks threaten security and safety
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals...
IDG TECHtalk
How to send Outlook email, Teams messages and more from R
Microsoft’s Azure team has developed Microsoft365R, which makes it possible to send emails (and Teams messages!) with R. It's a package that interacts with Microsoft 365 APIs. Connect to your Microsoft 365 account with R and send Outlook...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?
You will learn how hard it has become to hack into systems and company networks these days. This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training Course".This...
Packt
List computer networking media : E-Mail
From the section: The Internet. Here, we explore our internet options. Continuing with the Application-layer protocols, this episode explores e-mail. Mike covers the three classic e-mail protocols, SMTP for sending and POP3 and IMAP4 for...
Curated Video
The Full Stack Web Development - Forms & Input - Project Registration Form
Basic HTML Programming: Forms & Input - Project Registration Form This clip is from the chapter "Basic HTML Programming" of the series "The Full Stack Web Development".In this section, the author briefly goes over the frontend technology...
Curated Video
Apache Maven Beginner to Guru - Generating Java Classes with Project Lombok and Maven
This video explains how to generate Java classes using project Lombok and Maven. This clip is from the chapter "Generating Source with Maven" of the series "Apache Maven: Beginner to Guru".This section is about Generating Source with Maven.
Curated Video
The Complete Excel Guide: Beginners to Advanced - Excel Shortcuts Every User Should Know
The aim of this video is to explore how to use Excel shortcuts. This clip is from the chapter "Excel 2019 Beginners: Shortcuts" of the series "The Complete Excel Guide: Beginners to Advanced".In this section, we'll learn about shortcuts.
Curated Video
IELTS Energy Podcast 928: To Cliché or Not Cliché, That is the IELTS Question
IELTS Energy Podcast 928: To Cliché or Not Cliché, That is the IELTS Question
XKA Digital
People need to re-charge at the weekend
Andy is a Director of MCL, a management consultancy which helps organisations with significant change management and leadership development issues. Andy is a strategic thinking executive with an in-depth knowledge of the commercial,...
Curated Video
Describe network protocols : The Course Overview
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. This video will give you an overview about the course.
ATHS Engineering
Onshape Tutorial: Creating an Assembly Box with Hinge and Lid
This is a tutorial for students on how to use Onshape to create a box with a hinge and a lid. The tutorial covers creating sketches, using extrude and fillet tools, and creating a hinge insert. The teacher provides step-by-step...
Curated Video
How YouTube Became a Social Media Phenomenon
YouTube is a social media platform where users can upload, share, and view videos. It was founded in 2005 and quickly became one of the most popular sites on the internet. Learn how the site was founded and how it has evolved.
Seven Dimensions
Overcoming Negative Thoughts and Working Together as a Team
In this video, a leader addresses their team about transitioning to a new system. They encourage team members to express their negative thoughts by writing them on slips of paper and depositing them in a box. The leader acknowledges the...
XKA Digital
People remember how you make them feel-
Rick started his business career as a graduate engineer in Electronics but quickly moved into the corporate world of sales. In 2004, he developed a fashion and lifestyle brand called Joystick Junkies and took the brand from making...
IDG TECHtalk
How to prevent business email compromise in Microsoft 365
BEC campaigns are finding clever ways to bypass some protections. Use this advice to tighten up controls to keep malicious emails from getting through in Microsoft 365.
Curated Video
Bash Shell Scripting- Shell Script to monitor File System Utilization with mail alerts
This video shows how to write a shell script to monitor file system utilization with mail alerts. This clip is from the chapter "Scheduling jobs with at and crontab" of the series "Complete Bash Shell Scripting".This section shows how to...
Curated Video
Python 3: Project-based Python, Algorithms, Data Structures - Project: Job Scheduler using Binary Search Trees - Introduction
Go through implementation steps from concluded project This clip is from the chapter "Algorithms - Search and abstract data structures" of the series "Python 3: Project-based Python, Algorithms, Data Structures".null
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Digital signatures
CISSP Domain 3: System Architecture and Engineering: Digital signatures. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...