Physics Girl
Can you call a cell phone in the microwave?
Do cell phones placed in a microwave still receive signals? What is the difference between microwave oven radiation and the signals used by your phone?
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - US Laws, European Laws, and International Treaties
This video focuses on US laws, European laws, and international treaties. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
TLDR News
Chlorinated Chicken and Selling the NHS: Does the UK Want A Deal With America - TLDR News
With the UK set to officially leave the EU at the end of the year, many are looking forward to the new deals Britain will be able to strike. Chief amongst them is a deal with the United States. However, some are less keen, concerned...
The Business Professor
Authority for Judiciary Under Article II
This Video Explains Authority for Judiciary Under Article II
Hip Hughes History
The Second Amendment Explained: The Constitution for Dummies Series
HipHughes lays down the 2nd amendment, if you don't know the words, you don't get to debate. A short lecture on the text, interpretations and history of the 2nd amendment so you can make up your own mind.
Mediacorp
Indonesia's Constitution
This video explores the history and significance of Indonesia's constitution, particularly the principles of Pancasila. The video also addresses the growing influence of Islamic conservatives and the potential impact of proposed changes...
The Wall Street Journal
Staying Safe
In an era of deregulation, what happens to drug policy designed to keep the public safe?
Mister Simplify
PESTLE Analysis - The Simplest explanation ever
PESTLE analysis is a renowned management framework used to study the external factors affecting projects / brands / businesses. A concept in regular use by managers across the world, the explanation is kept simple and precise to help...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security and the Information Life Cycle
Security must be applied to all phases of the information life cycle, from collection to its eventual archiving and deletion. This includes data security techniques such as tokenization and masking while considering how laws apply to...
Blockchain Central
How To Choose a Crypto Exchange?| Blockchain Central
This week on Blockchain Central: we'll take a closer look at Crypto Exchanges and their types, and analyse what features are the ones you have to take into consideration before registering on an exchanger?
__
'Blockchain Central' is...
The Wall Street Journal
Gene Editing: The Present And Future
The U.S. is approaching human gene editing with more caution, while scientists in China are racing to experiment with gene editing. What are the latest progress and the social and ethical implications?
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Laws and Regulations
This video focuses on the laws and regulations. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and...
The Wall Street Journal
The Regulatory Outlook
Roger Severino, Director, Office for Civil Rights, Department of Health and Human Services talked about where cyber regulators are focusing their efforts and how well companies are positioned for compliance.
Healthcare Triage
The Longer Term Impact of Short Term Plans
The Trump administration can still do plenty to mess with the Affordable Care Act. We warned about that in many episodes, and it’s coming to pass.
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Laws and regulations
CISM Domain 1: Information Security Governance: Laws and regulations This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information Security Governance Video Boot...
The Business Professor
What is the structure of Environmental Protection Laws
What is the structure of Environmental Protection Laws
Institute for New Economic Thinking
Ha-Joon Chang: Economics Upside Down
In INET's full interview with Ha-Joon Chang, he discusses some ideas that seem contrary to traditional thinking in economics, such as free trade does not necessarily make countries richer, and that there is no such thing as a free market.
Jabzy
Passports - Stuff That I Find Interesting
In this video, Jabzy brings us historical tidbits and unknown facts about Passports
The Business Professor
Major Federal Securities Laws - Explained
Major Federal Securities Laws - Explained
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Laws and Regulations - Evidence
This video explains the laws and regulations, focusing on the evidence. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
The Wall Street Journal
New Scrutiny on Money Laundering
Morgan Stanley Anti Money Laundering Counsel Nicole De Bello and Citigroup Global Anti-Money Laundering Head Cathy LaFalce discuss how their companies are adjusting their compliance in preparation for the new expansive anti-money...
Next Animation Studio
EU to use drones to catch cheating farmers
Authorities across Europe are turning to drones in a bid to catch farmers who may be ignoring EU farming regulations or claiming illegal subsidies. The drones can be used to catch offenders who have ignored regulations and felled trees...