Bill Carmody
Methods for Sending US Letters
How you send your letters and business correspondence matters based on what you're optimizing for: Cost, Time, and/or tracking receipt. Depending on what you want, you have many options and in this video, I walk through the various...
Curated Video
The Interactive Biology Story
In this video, I invite you to a very special webinar that I'm doing to help you build a platform where you can create content, inspire others and change the world.
Science360
Sounds Of Survival
Many animals communicate with members of their own species using specific sounds. These sounds are behaviorally relevant to the animals because they facilitate important behaviors such as maintaining a territory or finding offspring on...
Englishing
ESL - Writing an email (step-by-step guideline)
In this video lesson, Mr. P. will show you the most important tips to write a formal and an informal email. At the end of the video, Mr. P. will provide common phrases to use in an email. This lesson is designed for intermediate students...
Global Ethics Solutions
Ethical Expectations: Code of Conduct and Compliance Training (Section 4)
This presentation introduces participants to various ethical decision-making models and then expands to cover common code of conduct topics. The emphasis of this course is to help employees develop solid ethical decision-making skills in...
Brian McLogan
Applying cross multiplication to solve a proportion
👉 Learn how to solve proportions. Two ratios are said to be proportional when the two ratios are equal. Thus, proportion problems are problems involving the equality of two ratios. When given a proportion problem with an unknown, we...
TLDR News
The Destruction of United States Postal Service? What the Hell is Happening to the USPS? - TLDR News
In recent weeks there have been some pretty substantial changes made to the United States Postal Service, with people claiming that some might be trying to destroy the USPS. This would always be controversial, but especially in the light...
Mazz Media
Internet Safety- Could I Be A Cyberbully?
Students will learn that will all the great technology we have to help us communicate comes great responsibility and using the technology incorrectly can cause harm to ourselves and others. Viewers will come to understand that their...
Curated Video
Understanding the Internet
The internet is a global network that connects millions of computers around the world, allowing them to communicate and share information. The internet allows users to access data and websites, as well as other services like file...
Curated Video
Java Programming for Complete Beginners - Java 16 - Step 08 - Object is at Top of Inheritance Hierarchy
In this session, we will learn about object is at the top of inheritance hierarchy. This clip is from the chapter "Object-Oriented Programming Again" of the series "Java Programming for Complete Beginners - Java 16".In this section, we...
Mediacorp
Managing Digital Clutter: The Risks and Solutions
In this video, the speaker discusses the risks and anxiety caused by digital clutter and the importance of managing personal photos and documents stored on devices and online platforms. They highlight the potential vulnerabilities and...
Mazz Media
Internet Safety- Knock, Knock, Who's There?
This program helps children to understand they need to beware of engaging online with people you don't know or recognize. Through a series of short videos, viewers will learn to be cautious of online offers that are free, or seem too...
Packt
Preparing Sample Data
This video explains how to prepare the sample data. This clip is from the chapter "Getting Started with MongoDB" of the series "MERN E-commerce from Scratch".This section explains how to get started with MongoDB.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Social Engineering Attack
This video explains the social engineering attacks, such as dumpster diving, shoulder surfing, and phishing. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total...
Curated Video
Active Directory with Windows Server 2016 - Certificates with Mike
A visit from Mike Meyers provides an overview of certificates, certificate authorities, and PKI (Public Key Infrastructure). This segment from Mike’s Security+ series will help fill in any knowledge gaps you might have before moving into...
Curated Video
Web Security: Common Vulnerabilities And Their Mitigation - Social Engineering
Lot's Of Interesting Bits Of Information: Social Engineering This clip is from the chapter "Lot's Of Interesting Bits Of Information" of the series "Web Security: Common Vulnerabilities And Their Mitigation".In this section, we look into...
IDG TECHtalk
How to send email with R and Gmail
See how to automate sending email with the R programming language and Gmail. Have a request for a future Do More With R episode? Leave your suggestions in the comments below.
Global Ethics Solutions
Cyber Ethics in a Real World
When using your company’s computer, it is important to remember that it is owned by your employer. This means that they have a right to monitor or view anything that you do on that computer. As an employee, you have a responsibility to...
Learning Mole
What is Phishing?
Join Jamal on his 'Phishing trip'. Jamal has lots of questions. What is Phishing? How can you protect your money?
Englishing
English Vocabulary lesson on ACRONYMS AND ABBREVIATIONS (NEW ENGLISH WORDS)
This video is about the usage of acronyms and abbreviations on smartphones and the internet. Over the last ten or even twenty years, English speakers have been using abbreviations to substitute words and whole phrases. In this video, Mr....
XKA Digital
Communicating to different audiences
Trevor is Director of Strategy at the specialist market design, governance and assurance service provider Gemserv, an organisation designed to ensure complex markets work for everyone's benefit. Prior to joining Gemserv in June 2017,...
Curated Video
How Email Became a Primary Communication Method
A few decades ago, landline phones were the primary form of quick communication between people. With the development of the internet came email, which took the place of many phone calls. From ARPANET to modern times, understand how email...
Seven Dimensions
Reward and Recognition Strategies for Employee Motivation
This video discusses various ways in which a company rewards and recognizes its employees for their achievements and contributions. It emphasizes the importance of acknowledging individuals and teams, whether through financial...