The Guardian
Frozen out: the US interpreters abandoned on Europe’s border
Ahmad and Mati served the US military as interpreters during the war in Afghanistan, but like many others who did so they haven’t been granted visas to emigrate to the US. With their lives threatened by the Taliban, they joined migrants...
Learn German with Herr Antrim
Demystifying hin and her: German Grammar
In this German lesson, we explore the fascinating world of 'hin' and 'her', two directional words that play a crucial role in indicating movement towards or away from a location. Whether you're a beginner or an intermediate learner,...
Learn German with Herr Antrim
How to Use "Wo", "Woher" and "Wohin" Question Words
In this German language lesson, you will learn how to use the three "where" question words: "wo", "woher", and "wohin". The video explains when to use each word based on location, destination, and origin. It provides examples of each...
Debunked
Should You Walk or Run in the Rain?
A question we all ask ourselves every time a black cloud appears and starts rain down on you. So once and for all we investigated this daily quandary to find out the answer!
Curated Video
Cell Material Transport
Cell Material Transport describes the functions of membrane-bound cellular organelles by explaining how each facilitates transport of materials within cells.
Curated Video
Wireshark D4 V4 - IPv4 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 4: IPv4 deep-dive
Curated Video
Wireshark D4 V5 - IPv6 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 5: IPv6 deep-dive
Curated Video
Wireshark D3 V4 - How is traffic capturedCapture Filters
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 4: Capture filters
Curated Video
Wireshark D3 V5 - Display filters
DAY THREE - Learn to implement the various Filters of Wireshark including Display Filters and Capture Filters - Video 5: Display filters
Curated Video
Wireshark D4 V6 - ICMPv4 Deep Dive
DAY FOUR - Inspect packets for common network and transport layers protocols - Video 6: ICMPv4 deep-dive
Curated Video
Learn JMeter from Scratch on Live Applications - Performance Testin - Interleave Controller Use on JMeter Tests
This video explains the use of the Interleave Controllers on JMeter tests. This clip is from the chapter "JMeter Controllers for Module-wise Metrics" of the series "Learn JMeter from Scratch on Live Applications - Performance...
Curated Video
Protect Yourself from Phishing Attacks
The video explains the phishing attack techniques and how you can identify and avoid them.
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Kinesis Data Firehose
This video explains the concept of Amazon Kinesis data firehose. This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn to build up a...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - Kinesis Data Streams Versus SQS
This video illustrates the difference between Amazon Kinesis data streams and Amazon SQS. This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - S3 Event Notifications – Hands-On
This video is a practical video where we will demonstrate S3 event notifications. This clip is from the chapter "Domain 2: Storage" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn...
Curated Video
AWS Certified Data Analytics Specialty 2021 – Hands-On - CloudWatch Subscription Filters with Kinesis
This video focuses on the CloudWatch subscription filter with Kinesis. This clip is from the chapter "Domain 1: Collection" of the series "AWS Certified Data Analytics Specialty (2022) Hands-on".In this section, you will learn to build...
Bethany Thiele, Art Teacher
Your Sculpture as Virtual Public Art!
Put your sculpture anywhere in the world for a virtual public art display using this lesson!
TMW Media
Why Austin, Texas is a great tourist destination
Situated in Central Texas along the Colorado River is a city known for its eclectic style and diverse culture. As the capital of Texas, Austin is home to a music, art and food centered community that has shaped the city into one of the...
Curated Video
routing protocols : Types of Routing Protocols -Distance Vector, Link State
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Types of Routing Protocols -Distance...
TMW Media
ASL - Travel Vocabulary
Excellent for every American Sign Language (ASL) student as well as teachers, parents and professionals learning ASL to be able to communicate clearly, naturally and start signing with the deaf community and people with hearing loss....
Curated Video
Describe network protocols : Network Layers
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will have a look at Network Layers and learn something about...
TMW Media
The History of Las Vegas
Journey to the Wild West on today’s episode of Travel Thru History! Take a peek behind the curtain of the most entertaining city in the world. It’s a place carved out of the Mojave Desert; a place we’ve come to know as Las Vegas. While...
ProTeachersVideo
The Kindertransport: Goodbye Home
Personal testaments reveal the moving story of the 10,000 Jewish refugee children who came to Britain with the Kindertransport just before the second world war. In 1938 and 1939 ten thousand Jewish refugee children were saved from a life...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Firewalls
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...