Instructional Video4:01
Curated Video

Design Microservices Architecture with Patterns and Principles - Analysis E-Commerce Domain - Nouns and Verbs

Higher Ed
In this video, we will explore the key nouns and verbs in the e-commerce domain to identify potential microservices. You will learn to analyze the business domain to extract entities, value objects, and the actions they perform, which...
Instructional Video3:37
Curated Video

Design Microservices Architecture with Patterns and Principles - Identify Bounded Context Boundaries for Each Microservices

Higher Ed
In this video, you will learn practical techniques and strategies to identify Bounded Context boundaries for each microservice in your architecture. We will understand the importance of isolating domains and ensuring that each...
Instructional Video3:42
Curated Video

Design Microservices Architecture with Patterns and Principles - Bounded Context Pattern (Domain-Driven Design - DDD)

Higher Ed
In this video, we will explore the Bounded Context pattern, a key concept in Domain-Driven Design (DDD) for designing microservices. We will understand how to identify and define Bounded Contexts to create clear boundaries and...
Instructional Video2:42
Science Buddies

How Does an Electromagnet Work?

K - 5th
You may be familiar with permanent magnets—the kind that hang on a refrigerator. But did you know that other magnets, called electromagnets, can be turned on and off? When turned on, electromagnets act just like permanent magnets, but if...
Instructional Video11:20
Curated Video

Real-World DevOps Project From Start to Finish - Deploying, Configuring, and Setting Pi-Hole as a DNS Resolver

Higher Ed
This video will teach us to deploy and configure Pi-Hole as a DNS resolver. We will discover how Pi-Hole can block ads at the DNS level, providing ad-blocking capabilities for our entire network. We will explore the installation process,...
Instructional Video11:13
Curated Video

Real-World DevOps Project From Start to Finish - certbot, ACME protocol, wildcard TLS certificates

Higher Ed
This video will dive into certbot, the ACME protocol, and wildcard TLS certificates. You will learn to install and configure certbot, obtain TLS certificates for servers and applications, and automate the certificate renewal process. We...
Instructional Video7:14
Curated Video

AWS Tutorial AWS Solutions Architect and SysOps Administrator - How to Create Hosted Zone

Higher Ed
This video demonstrates how to create the hosted zone. This clip is from the chapter "Route 53 - Scalable DNS and Domain Registration" of the series "AWS Tutorial: AWS Solutions Architect and SysOps Administrator".This section focuses on...
Instructional Video5:20
Curated Video

Subclinical Psychosis – Can You Be A Little Psychotic?

Higher Ed
Subclinical psychosis is a term some researchers have used to describe psychotic symptoms in people who don’t have a primary psychotic illness or as a way to identify people who are prone to later get a psychotic illness. It’s not really...
Instructional Video3:36
Curated Video

Teaching Heroism

12th - Higher Ed
Psychologist Philip Zimbardo (Stanford) describes the important project he launched of teaching people to act heroically when the time for action arises.
Instructional Video4:42
Brainwaves Video Anthology

Melissa Henning - Using the Four Domains to Help ENL Students Learn

Higher Ed
Melissa Henning is the Educational Content Manager for Source for Learning, the non-profit parent company of TeachersFirst. She has over 16 years of experience in education. Melissa is a frequent presenter at national and regional...
Instructional Video3:33
Global Health with Greg Martin

What to expect from a Master of Public Health degree. Why do an MPH?

Higher Ed
I f you are about to start or thinking of doing a Master of Public Health degree, then this video will tell you what you should expect from the program. An MPH is an excellent stepping stone into a public health or global health career....
Instructional Video3:58
Curated Video

The Classification of Life

3rd - 8th
A video entitled “The Classification of Life” which describes taxonomy and how all organisms on Earth are organized according to the Linnaean system.
Instructional Video5:27
Curated Video

Mapping ISO 27001- 2013 and ISO 27001- 2022 ANNEX A controls

Higher Ed
In this video, we will be discussing the process of mapping ISO 27001-2013 and ISO 27001-2022 ANNEX A controls. ISO 27001 is a globally recognized standard for information security management systems, and it provides a framework for...
Instructional Video1:25
Curated Video

Improvement Domain (ISO 27001)

Higher Ed
In this video, we will be discussing the Improvement Domain of ISO 27001. This domain is crucial for organizations that want to continuously improve their information security management system. We will cover the key concepts and...
Instructional Video5:59
Healthcare Triage

Retail Clinics are Convenient, Reliable, and Kind of Affordable

Higher Ed
Aaron and his wife both work. When one of their kids wakes up complaining of a sore throat, they begin a ritual staredown to determine which of them is going to have to wait for the doctor's office to open, call them, wait on hold,...
Instructional Video4:45
Brainwaves Video Anthology

Constance Steinkuehler - Games, Learning and Society

Higher Ed
Constance Steinkuehler is an Associate Professor in Digital Media at the University of Wisconsin–Madison and co-directs the Games+Learning+Society (GLS) center at the Wisconsin Institute of Discovery and chairs their annual GLS...
Instructional Video8:38
Brian McLogan

Overview of implied domain of functions

12th - Higher Ed
👉 Learn how to find the domain of rational functions. Recall that the domain of a function is the set of possible input values (x-values) of the function. For a rational function, the denominator cannot be zero. Thus, to find the domain...
Instructional Video3:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - About the Security+ (SY0-601) Exam

Higher Ed
This episode goes over the domains of the CompTIA Security+ (SY0-601) exam objectives and the various topics that are covered. This clip is from the chapter "Risk Management" of the series "CompTIA Security+ Certification SY0-601: The...
Instructional Video1:49
Brian McLogan

Find the difference of two quadratic equations to find the domain

12th - Higher Ed
👉 Learn how to add or subtract two functions. Given two functions, say f(x) and g(x), to add (f+g)(x) or f(x) + g(x) or to subtract (f - g)(x) or f(x) - g(x) the two functions we use the method of adding/subtracting algebraic expressions...
Instructional Video1:29
Visual Learning Systems

Magnetism: Magnetism Explained

9th - 12th
This video explores the force of magnetism and how it affects our everyday lives. The atomic nature of magnetism is illustrated, and then applied in principle to common magnets. The video highlights how magnetic fields are created, and...
Instructional Video11:11
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Standards and Frameworks

Higher Ed
This video focuses on standards and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
Instructional Video4:13
Curated Video

Learning ASP.NET Web API (Video 20)

Higher Ed
Revolutionary changes in the mobile world introduced various type of devices such as smart phones, tablets, and IoT devices, all connected to a network based on a HTTP protocol and HTML 5. This lead to a big push to build REST-based...
Instructional Video3:54
Curated Video

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - The 4 CISM domains

Higher Ed
Introduction: The 4 CISM domains This clip is from the chapter "Introduction" of the series "CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019".In this section, learn why you want to get your CISM...
Instructional Video20:36
The Wall Street Journal

Gen. Mark Milley on the U.S.-China Relationship

Higher Ed
Chairman of the Joint Chiefs of Staff, Gen. Mark Milley, discusses China's growing military capabilities and how technology is dramatically shifting the character of war and potential conflict around the world.