Hi, what do you want to do?
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Targeted Email Phishing Part III
In Part III of this module, you will continue to see several ways in which hackers and scammers are social engineering us, via emails and webpages. Even more major red flags are exposed so that these now become ingrained in our brains....
friEdTech
Three Minute Tech Tip: Filters plus Labels Gmail
Learn how to have Gmail automatically file email when it comes into your inbox so that you can just read it and archive it without applying labels.
IDG TECHtalk
How to defend Office 365 from spear-phishing attacks
Configure Office 365 to detect email-delivered malware.
Curated Video
Learn Git in 3 Hours- Installing and Configuring Git
Learn how to install Git on your machine, be it OS X or Windows. • Download the installer for your operating system • Run the installer • Configure Git on your machine This clip is from the chapter "Version Control and the Terminal" of...
Packt
User Edit Screen and Getting User Details
This video focuses on the user edit screen and explains how to get the user details. This clip is from the chapter "Admin Screens-Part 1" of the series "MERN E-commerce from Scratch".This is the first part of a two-part section that...
Curated Video
.NET Core Microservices - Configuring Clients in Identity Server
This video explains configuring clients in identity server. This clip is from the chapter "Identity Server" of the series ".NET Core Microservices - The Complete Guide (.NET 6 MVC)".In this section, you will learn about identity server.
IDG TECHtalk
Can the iPad Pro replace the MacBook as an enterprise device?
On this episode of Today in Tech, Computerworld executive editor Ken Mingis and Macworld writer Michael Simon join Juliet to debate whether or not the iPad Pro is a practical enterprise device. Can the iPad Pro ever replace a traditional...
Easy Languages
Easy Croatian 14 - How do you feel about digital media?
Easy Croatian 14 - How do you feel about digital media? Easy Languages is an international video project aiming at supporting people worldwide to learn languages through authentic street interviews and expose the street culture of...
IDG TECHtalk
What security and IT admins need to know about Microsoft Threat Protection
Microsoft Threat Protection can help admins monitor and secure much of a Windows network, but licensing requirements are confusing.
Curated Video
AWS Certified Cloud Practitioner (CLF-C01)- Create a Billing Alarm
In this video, we'll learn how to create a billing alarm. This clip is from the chapter "Introduction to AWS Certified Cloud Practitioner CLF-C01 and Cloud Computing" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for...
Curated Video
Bash Shell Scripting- Monitor File system usage and send mail alerts
This video shows how to Monitor File system usage and send mail alerts. This clip is from the chapter "Real-Time Practice (Low level to High level)" of the series "Complete Bash Shell Scripting".This section covers various Bash shell...
Packt
User Register Reducer, Action, and Screen
This video focuses on user register reducer, action, and screen. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication...
Packt
Profile Screen and Getting User Details
This video focuses on the profile screen and explains how to acquire user details. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Matching an Author's Email against a Regular Expression
This video demonstrates how to match an author's email against a regular expression. This clip is from the chapter "GitHub Hooks" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains GitHub hooks...
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 07 - Understanding Inheritance - Why Do We Need It?
In this session, we will understand inheritance - why we need it. This clip is from the chapter "Object-Oriented Programming Again" of the series "Java Programming for Complete Beginners - Java 16".In this section, we will revert to OOP...
Curated Video
Frontend Web Development Bootcamp - Build a Twitter Clone - Forms - Part 1
HTML Crash Course: Forms - Part 1 This clip is from the chapter "HTML Crash Course" of the series "Frontend Web Development Bootcamp: Build a Twitter Clone".This section explains about HTML, Headings, Paragraphs, Lists, Links and so on.
Curated Video
DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK, JIRA - Jenkins Plugin Basic
In this video, you will be able to install the plugins and do basic configuration. This clip is from the chapter "Continuous Integration and Continuous Deploy" of the series "DevOps with GIT(Flow) Jenkins, Artifactory, Sonar, ELK,...
The March of Time
Rockefeller Center mail
MOT 1937: ROCKEFELLER CENTER MAIL: (POV behind) Mail clerk man delivering mail to Rockefeller Foundation executive offices African-American receptionist. CU Letters envelopes being sorted addressed to John D. Rockefeller. New York City NYC
Science360
Ultimate sacrifice - Spider's post-sex cannibalism aids offspring
In this spooktacular episode, Jordan and Charlie explore the male dark fishing spider’s ultimate sacrifice. This death wish probably evolved to benefit his offspring, which grow nearly 20 percent larger, and survive about 50 percent...
Packt
Updating User Profile
This video shows how to update the user profile. This clip is from the chapter "Front-end User Authentication and Profile" of the series "MERN E-commerce from Scratch".This section focuses on front-end user authentication and profile.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Certificates and Trust
This video explains the various certificates and how they are used to establish trust. This clip is from the chapter "Securing Transmission Control Protocol/Internet Protocol (TCP/IP)" of the series "CompTIA Network+ Certification...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Applying Domain Name System (DNS)
This video explains how to work with DNS and discusses the various record types that are available, what their purpose is, and how they can be used. This clip is from the chapter "Network Naming" of the series "CompTIA Network+...
Curated Video
Complete Git Guide: Understand and Master Git and GitHub - Creating a GitHub Account
This video demonstrates the process of creating a GitHub account. This clip is from the chapter "GitHub and Remote Repositories" of the series "Complete Git Guide: Understand and Master Git and GitHub".This section explains Git hosting...
Curated Video
World of Computer Networking Your CCNA start - Applications and Protocols
This video introduces you to the basic protocols for applications. This clip is from the chapter "Transmission Control Protocol/Internet Protocol (TCP/IP) and Open Systems Interconnection (OSI) Models" of the series "World of Computer...