Instructional Video2:08
Great Big Story

Dive into the secrets of legends of the hidden temple

12th - Higher Ed
Uncover the intriguing behind-the-scenes facts of the classic 90s Nickelodeon game show, Legends of the Hidden Temple.
Instructional Video3:54
Wonderscape

Hour Hands & Half Pasts: Simplifying Time with Tick Tock

K - 5th
Dive deeper into time-telling with Marissa and Tick Tock as they focus on understanding the hour hand and the concept of 'o'clock'. Learn how to read clocks with hands, identify the shorthand for hours, and explore how the long hand...
Instructional Video6:34
Wonderscape

Mastering Time: Learn to Read Clocks with Tick Tock

K - 5th
Join Marissa and her comedic sidekick, Tick Tock the clock, as they guide you through the basics of reading time on both analog and digital clocks. From understanding clock hands to counting minutes, this fun-filled lesson makes...
Instructional Video5:11
Great Big Story

Life as a Dulser, generations of traditions in the dark harbor

12th - Higher Ed
Delve into the life of a seasoned dulser as he recounts his family's long-standing tradition of harvesting kelp in the secluded Dark Harbor.
Instructional Video3:35
Curated Video

The CISO Masterclass - STAR Methodology

Higher Ed
In this video, learn about the STAR methodology and how to use it effectively during interviews to showcase your skills and experiences.
Instructional Video5:18
Curated Video

Deep Learning - Recurrent Neural Networks with TensorFlow - Other Ways to Forecast

Higher Ed
In this video, we will discuss some other ways that might generate multi-step forecast. This clip is from the chapter "Recurrent Neural Networks (RNNs), Time Series, and Sequence Data" of the series "Deep Learning - Recurrent Neural...
Instructional Video11:13
Curated Video

Modern JavaScript from the Beginning - Second Edition - Animated Clock - Part 2

Higher Ed
In this video, we will continue creating the animated clock from the previous video. We will see how to add a minute hand, an hour hand, and a second hand to the clock. This clip is from the chapter "Web Browser APIs" of the series...
Instructional Video6:14
Curated Video

Machine Learning: Random Forest with Python from Scratch - Classification versus Regression

Higher Ed
Let's learn about the three modes of machine learning: classification, regression, and clustering. This clip is from the chapter "Introduction to Machine Learning" of the series "Machine Learning: Random Forest with Python from...
Instructional Video8:33
Curated Video

Shocking Talent: Unveiling the Secrets of Battery Man

6th - Higher Ed
Dive into the electrifying world of Slavisa Pajkic, also known as Battery Man, who stuns audiences by conducting electricity through his body in ways that seem to defy science. Learn how he uses knowledge of electrical principles to...
Instructional Video8:40
Curated Video

Mind Over Matter: Controlling Technology with Thought

6th - Higher Ed
Discover the cutting-edge technology enabling humans to control objects with their thoughts alone. Witness experiments like levitating plates and piloting drones using brain-computer interfaces, and explore the life-changing applications...
Instructional Video8:36
Curated Video

Revolutionizing Music: The Future of Instruments

6th - Higher Ed
Dive into the world of futuristic musical instruments where traditional boundaries are redefined. Explore the 3DVarius, an electric violin crafted through 3D printing, and the Dualo, an intuitive synthesizer that makes learning music...
Instructional Video8:03
Curated Video

The Secret Life of the Fetus: Sensory Experiences Before Birth

6th - Higher Ed
Uncover the fascinating sensory world of the fetus during its time in the womb. From the first stirrings of movement to developing taste preferences influenced by maternal diet, this video reveals how fetuses actively experience their...
Instructional Video8:36
Curated Video

The Science Behind Being Left-Handed or Right-Handed

6th - Higher Ed
This video explores why most people are right-handed while others are left-handed, including a look into brain lateralization and the lack of genetic markers for handedness. It examines the challenges left-handers face in a right-handed...
Instructional Video8:27
Curated Video

The Secret Life of Stuffed Animals: Comfort and Choices

6th - Higher Ed
Discover why stuffed animals hold a special place in children's hearts. This part delves into the sensory preferences that lead a child to favor a particular plush toy, emphasizing the importance of touch and smell. The segment also...
Instructional Video5:25
Curated Video

JavaScript Mastery from Zero to Hero - Prepare for Coding Interviews - What Is a Factorial in JavaScript (Probability Calculations)

Higher Ed
In this video, you will learn about the concept of factorials in mathematics and how to calculate them using JavaScript. A factorial is a mathematical function that represents the product of all positive integers from 1 up to a given...
Instructional Video7:15
Curated Video

Project Finance and Excel - Build Financial Models from Scratch - Building the Balance Sheet

Higher Ed
In this video, we will be building the last financial statement, which is the balance sheet. This clip is from the chapter "Building the Three Key Financial Statements" of the series "Project Finance and Excel - Build Financial Models...
Instructional Video11:03
Brave Wilderness

STUNG by a Costa Rican Bush!

6th - 8th
The wild man is at it again, as he takes on another brutal stinging plant... Urera Baccifera, AKA "The Scratchbush". What starts as an accidental sting, turns into something much bigger when Coyote SMASHES this nightmare onto his arm,...
Instructional Video5:08
Curated Video

Data Science Model Deployments and Cloud Computing on GCP - Serverless with AWS

Higher Ed
This video explains serverless, which is just a fancy term for choosing to use cloud services rather than write a server by hand. The truth is that it is still a server; it's just that the cloud services provider has written a portion of...
Instructional Video2:59
Curated Video

Professional Scrum Master 2 (PSM II) Certification - A Crash Course - Scrum Master Versus a Traditional Project Manager: An In-Depth Task Comparison

Higher Ed
In this video, we will delve into technical interviews and learn how ChatGPT can support our preparation, strategies, and tips for navigating technical interviews, including common interview questions, problem-solving approaches, and...
Instructional Video8:49
Curated Video

Innovations in Healthcare: Transforming Everyday Medical Practices

6th - Higher Ed
Discover groundbreaking advancements in healthcare that promise to transform routine medical practices. From a nano-glue that instantly seals cuts without leaving scars to smartphone applications that improve vision without glasses, and...
Instructional Video7:43
Curated Video

Harnessing Brain Power: Enhancing Agility and Memory

6th - Higher Ed
Dive into the fascinating world of brain agility and memory enhancement. Learn how repetitive activities like juggling can physically alter the brain, increasing gray matter in key areas. This video highlights the science behind brain...
Instructional Video8:31
Curated Video

Robotic Rhythms: The Dance of Machines and Technology

6th - Higher Ed
Discover the fascinating intersection of robotics and dance in this exploration of humanoid robots and virtual choreographers. Meet NAO, a small robot with the ability to mimic famous dance moves, and dive into the innovative technology...
Instructional Video7:41
Curated Video

The Animal Within: Uncovering Human Instincts

6th - Higher Ed
Explore the primal instincts that connect humans with the animal kingdom. This fascinating documentary delves into the survival and reproductive behaviors that humans share with animals, demonstrating our innate responses to fear and...
Instructional Video4:39
Curated Video

Building a ChatGPT AI with JavaScript - An OpenAI Code-Along Guide - ChatGPT API Key for OpenAI and Environment Security Protocol

Higher Ed
In this video, you will learn about ChatGPT API key for OpenAI and how to ensure environment security protocol to protect your system from potential security breaches.