Hi, what do you want to do?
Curated Video
Crazy Techniques US Border Police Use to Chase Illegal Boats at Sea
Welcome back to the FLUCTUS channel to witness different techniques the United States uses to protect its borders. Fluctus is a website and YouTube channel dedicated to sea geeks. Whenever you are curious or an incorrigible lover of this...
Curated Video
Radical Solution US Navy Found to Defend Their Ship in Middle of Ocean
Welcome back to the FLUCTUS channel for a discussion about the defense systems and tools the U.S. Navy uses to protect its most valuable vessels. Fluctus is a website and YouTube channel dedicated to sea geeks. Whenever you are curious...
Curated Video
Asteroid will strike Earth later today, astronomers say – but it should be fine
An asteroid struck the Earth on Wednesday 4 September.Source: LUMEN / The Independent
Curated Video
CG2271 AY2021SEM1 RTOS Project - TEAM 45
CG2271 AY2021SEM1 RTOS Project - TEAM 45 All our CEG students have to take the CG2271 Real-Time Operating Systems module. It's a module that introduces them to the concept of multi-threaded programming. As part of the requirements, they...
Brainwaves Video Anthology
H.W. Brands - America First: Roosevelt vs Lindbergh in the Shadow of War
H.W. Brands shares that the teacher who had the most influence on his career was his ninth-grade history teacher, Joe DeJardin. Though he didn’t realize it at the time, DeJardin's radical experiment deeply shaped his path. He split the...
Great Big Story
Secrets of the elusive Rowley's Palm Pit viper
Explore the rare and venomous Rowley's Palm Pit viper, a hidden gem of southern Mexico's forests.
The Business Professor
Voluntary Consent - Contract Law
What is the concept of voluntary consent in contract law?
The Business Professor
Understanding Porter's Five Forces for Market Analysis
This video explains Porter's Five Forces framework, which is a tool used to analyze the competitive dynamics of a product or service in a specific market. The five forces include supplier power, buyer power, competitive rivalry, threat...
The Business Professor
PESTEL Factors in SWOT Analysis
This Video Explains PESTEL Factors in SWOT Analysis
The Business Professor
Strategic Analysis and Developing a Competitive Strategy
What is a Strategic Analysis? How does strategic analysis lead to a competitive advantage? Strategic analysis drives out internal and external strengths and weaknesses that affect the organization's growth. It helps you identify the...
The Business Professor
4 Trajectories of Industry Change
What are the 4 Trajectories of Industry Change? Her research suggests that industries evolve along one of four distinct trajectories--radical, progressive, creative, and intermediating--that set boundaries on what will generate profits...
Curated Video
Landmarks - Great Barrier Reef
GREAT BARRIER REEF THE GREAT BARRIER REEF IS ONE OF THE SEVEN NATURAL WONDERS OF THE WORLD, AND IS THE ONLY LIVING ORGANISM THAT CAN BE SEEN FROM SPACE. A WORLD HERITAGE LISTED AREA, THE REEF STRETCHES MORE THAN TWO THOUSAND KILOMETRES...
Curated Video
Protecting the Great Barrier Reef: A Crucial Step Towards Conservation
The Great Barrier Reef is a World Heritage area and the largest living organism on Earth. It is home to an extraordinary diversity of marine life, including turtles, whales, sharks, and thousands of species of fish and coral. However,...
Let's Tute
Safeguarding against Counterfeit Currency
Today we are going to learn about the World of Counterfeit Currency.
Following points we cover in thi
s session:
1] What is counter
feit currency ?
2] Measures taken by the banks against the
counterfeit...
Following points we cover in thi
s session:
1] What is counter
feit currency ?
2] Measures taken by the banks against the
counterfeit...
Curated Video
What is NEUROSCIENCE?
These days you may be hearing a lot about neuroscience in business, leadership, and Project Management. But what is neuroscience?
A useful working definition in our c
ontext is:
Neuroscience is about...
A useful working definition in our c
ontext is:
Neuroscience is about...
Curated Video
What is the SCARF Model?
Social behaviors – like those we see in and around our projects – are driven by two urges: to minimize perceived threat, and to maximize potential reward. But what are the sources of threat and reward in the social domain?...
Curated Video
Landmarks - China's Great Wall
CHINA S GREAT WALL CHINA S GREAT WALL IS ONE OF THE FEW MAN MADE OBJECTS THAT CAN BE SEEN FROM SPACE. IT STRETCHES ACROSS MORE THAN 6,400 KM OF WINDING LANDSCAPE, AND DURING ITS 2,000-YEAR HISTORY, THE WALL HAS SURVIVED THREATS FROM...
Curated Video
The Evolution of Music Downloads: Embracing the Digital Age
This video discusses how record companies are embracing music downloading as a way to adapt to the changing market. It highlights the rise in legally downloaded songs and the increasing number of online music stores. However, it also...
Curated Video
The Cerberus Egg: Advanced Underwater Threat Detection and Tracking System
The Cerberus Egg is an innovative underwater security device designed to detect and track potential threats from underwater terrorists. Equipped with advanced sonar technology, it can identify divers and assess the level of threat they...
Curated Video
Top 5 Ways to Remove a Risk Entirely
There are six (arguably seven) strategies for managing risk. But the one that is least understood is the most powerful of all… if you can make it work: removing a risk entirely.
So, let's survey one...
So, let's survey one...
Curated Video
What is a RAG Report? ...or a Traffic Light Report?
RAG Report, or Traffic Light Report. It is widely used by project managers and it stands for Red Amber Green. But what is a RAG Report?
Curated Video
What is a Business Continuity Plan? PM in Under 5
When things go seriously wrong, one of the things you will need is a Business Continuity Plan. And, since projects involve risk to your organization, you'll need to link into this. <b<br/>r/>
So, what is a Business Continuity Plan?
So, what is a Business Continuity Plan?
Curated Video
Risk Management for Cyber Security Managers - What Is Risk?
This video explains what constitutes a risk in terms of a business, a functioning system, or all kinds of assets.
Curated Video
Risk Management for Cyber Security Managers - Information Security Controls
After learning to classify information differently, we will discuss the kinds of security controls available to us to avoid/control risks.