Hi, what do you want to do?
Debunked
Would A Nuclear Explosion Actually Destroy An Asteroid?
An apocalyptic asteroid is on a collision course with our wonderful little planet! What do we do?
Curated Video
Historical Context
Author and independent scholar Pankaj Mishra warns us not to essentialize, urging us to place the notion of "Asian Values" in historical context.
Curated Video
Meaning vs. Grammar
Cognitive scientist Victor Ferreira (UC San Diego) sketches out an intriguing future experiment he'd like to conduct to probe the difference between meaning-level and grammar-level effects.
Curated Video
Positive Emotions and Evolution
Psychologist Barbara Fredrickson (UNC Chapel Hill) addresses a fundamental puzzle: What evolutionary role might positive emotions play?
Curated Video
What is NATO?
NATO, or the North Atlantic Treaty Organization, is a coalition of democratic capitalist countries from Europe and North America. It remains perhaps the single biggest deterrent against nuclear war today.
One Minute History
107 Pancho Villa - One Minute History
Pancho Villa is a national folk hero and an icon of the Mexican Revolution. At sixteen, he drops his birth name, Jose Doroteo Arango Arambula, after killing a man for threatening to sexually assault his sister. He escapes into the...
Vlogbrothers
North Korea: Explained
Is North Korea going to bomb us? Is North Korea a Threat? Is North Korea Communist? Why does North Korea Hate us? These (according to my extremely imprecise research) are the most common questions people in the world have about North...
TLDR News
TLDR News Interviews Mitch McConnell
This weekend we attended the Munich Security Conference, where we met with Senate Minority Leader Mitch McConnell. During the conversation we talk about future US arms shipments to Ukraine and the threat posed by China. The Munich...
Curated Video
Threat Modeling
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Curated Video
Building Tension in Narrative Writing
Building tension is a very important skill in writing. In this lesson, we’ll explore five techniques, plus some other tips and tricks you can use to help build tension in your stories. Building Tension Techniques - Tease with clues - Use...
Curated Video
Threats and Vulnerabilities
In cybersecurity, a vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware and even...
Curated Video
The European Union is facing a threat to its very existence
The Treaty of Rome was signed 60 years ago this month. But can European leaders make the EU appealing to a new generation of more sceptical voters?
Learn French With Alexa
Salty Food French (basic French vocabulary from Learn French With Alexa)
Alexa teaches you some basic French vocabulary: SALTY FOOD in French.
Healthcare Triage
Innovation in a Changing US Health System
The US healthcare system has a lot of issues, but one thing it's got going for it is innovation. More clinical trials originate in the United States, and more Nobel Physiology and Medicine Laureates are from here than from any other...
PBS
How did Makeup, WWII, & Communism Create U.S. Healthcare?
If there's one debate you can't avoid today it's what do about the US health insurance. While many countries around the world have some form of nationalized, government run healthcare most people in the US have their healthcare provided...
Sustainable Business Consulting
Financial Threats
How to asses financial threats to your company around the topics of envrionmental quality and social justice and how incorporating sustainability can help your organization reduce financial threats
Seven Dimensions
Importance of Crisis Management Strategy in Business
In this video, Ross discusses the importance of crisis management and strategy planning for businesses. He emphasizes the need to identify and manage risks, as well as the importance of preparing for worst-case scenarios. Ross also...
Curated Video
School Violence: You Can Help Prevent It!
According to a recent report from the National Center for Educational Statistics violence, including student violence against teachers, is on the rise in America's schools. Statistics show that early 7% of high...
Step Back History
Women and White Power
The White Power Movement of the 80s was not only motivated by racist resentment but a patriarchal backlash against progress made by women in recent decades. So, how does a consciously anti-feminist movement with strict patriarchal...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Security Controls
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what types of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines...
History Hit
Yasmin Khan on the Indian Partition: World War Two after effects
Did the British have any chance of maintaining the Raj in 1945 after the second world war? What was on the minds of the British decision makers when faced with counter insurgency in India compared to talking of liberating Europeans...
Curated Video
Stomach Drop Feeling: Why Does Your Stomach “Drop” When You’re Anxious?
When we experience anxiety, our sympathetic nervous system is activated and initiates the fight-or-flight response. This response is a host of physiological changes that prepare us to either fight or flee. One of the effects of the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Risk Assessments and Treatments
How can you determine whether assets are adequately protected from threats? One way is running periodic risk assessments to address the ever-changing threat landscape to define the likelihood and impact of security incidents.
r/> ...
r/> ...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Threats and Vulnerabilities
The CIA security triad (confidentiality, integrity and availability) describes how solutions such as encryption, hashing, and data backups can address potential attack vectors that might be exploited by threat actors.
r/>
This...
r/>
This...