Hi, what do you want to do?
The Wall Street Journal
Lessons from a Data Breach
What actions can a business be taking once they suffer a data breach?
TLDR News
Is Biden to Blame for the Taliban Takeover? Biden Defends his Decision - TLDR Now
No Description
Jabzy
A Couple Japanese Radicals - Stuff That I Find Interesting
In this video, Jabzy brings us historical tidbits and unknown facts about Japanese Radicals
IDG TECHtalk
How to protect your Windows network login credentials
Recent hacks show that attackers will search for network login credentials in many ways. Make them harder to get.
Britlish
Pen Pusher (no subtitles)
This video English lesson looks at the idiom pen-pusher, a commonly used idiom. A 3D animated character is used to bring the idiom to life, particularly by pushing an enormous pen across the desk in front of a giant clock. The imagery...
XKA Digital
Seek common ground to resolve workplace conflict
Zenna currently works in the private sector, bringing innovation and solutions to complex problems; her driver is to deliver social benefit using commercial means. She is currently also engaged as the Academies Director for the South...
Packt
List computer networking media : Virtual Private Networks (VPNs)
From the section: The Internet. Here, we explore our internet options. In this episode, Mike shows how virtual private networking (VPN) works and why people use VPN connections. He discusses the types of protocols and clients that make...
TLDR News
What Are Johnson's Plans for Britain Going Forward - Brexit Explained
At the Conservative Party Conference, the Torys laid out their plans in the UK and for Brexit. In this video, we run through the parties plans, from Brexit to the environment to the minimum wage.
TLDR News
What May's Resignation Means - Brexit Explained
What May's Resignation Means - Brexit Explained
IDG TECHtalk
Microsoft 365 security recommendations and defaults: What you need to know
COVID-related attacks make it more important that you follow Microsoft’s advice to protect Microsoft 365 users and systems.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Keylogger Demo
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network.
r/>
...
r/>
...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Alternative Distribution Panels
This video explains the concept of distribution panels. This clip is from the chapter "Installing a Physical Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn to install a...
Packt
CompTIA Network+ Certification N10-007: The Total Course - Introduction to Structured Cabling
This video provides an introduction to structured cabling and explains its basic components, such as an equipment room, horizontal runs, and the work area. This clip is from the chapter "Installing a Physical Network" of the series...
Encyclopaedia Britannica
Who was? Hiram Revels.
Learn about the life of Hiram Revels, the first African American to serve in the U.S. Senate.
Mr. Beat
Why the Principal Can Search Your Purse | New Jersey v. T. L. O.
In episode 52 of Supreme Court Briefs, two students get caught smoking in the high school restroom, and one denies it, so the principal searches her purse
TLDR News
Bercow’s Plot to Derail Brexit? - Brexit Explained.
In recent years Conservatives and Brexiteers have become more and more frustrated with Speaker of the House of Commons, John Bercow. They often see him as too much of a remainer influence in the Commons. In this video, we discuss...
IDG TECHtalk
How to protect the enterprise from holiday attacks
Attackers often take advantage of the holidays to launch attacks. Use these Microsoft settings to deter them.
Packt
CompTIA Network+ Certification N10-007: The Total Course - Mitigating Network Threats
This video explains how to examine the methods to protect a network from both external and internal threats. This clip is from the chapter "Managing Risk" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this...
Economics Explained
Do We Need To Work 40 Hours A Week?: This Is How We Work
There are a lot of things that we take for granted in our day to day lives, and one of the big ones is how we spend a good portion of our waking hours. Based on sophisticated youtube analytics we can determine that a majority of...
Curated Video
The Complete Excel Guide: Beginners to Advanced - Exercise 07
Let us do a practice exercise.<br/<br/>>
This clip is from the chapter "Excel 2019 Advanced: PivotTables" of the series "The Complete Excel Guide: Beginners to Advanced".In this section, we’ll explore PivotTables.
This clip is from the chapter "Excel 2019 Advanced: PivotTables" of the series "The Complete Excel Guide: Beginners to Advanced".In this section, we’ll explore PivotTables.
Australian Broadcasting Corporation
The Housewives of Australian Parliament
Ms Represented is a series that charts the rise of Australian female politicians over the last one hundred years and the unbelievable things they got up to along the way. What does an empty fruit bowl say about a woman's fitness - or...
Curated Video
Saying What's Needed in English
This English language learning video shows learners how to talk about what’s needed and how to use modal verbs such as "have to," "should" and "must."
XKA Digital
Fly your own flag because no one else will
Keily is an award-winning Director in PwC's Commercial Litigation and Regulatory Disputes team. Prior to joining PwC in January 2017, Keily was a senior associate in the Litigation Group of Morrison & Foerster's London office. There...
The Wall Street Journal
Working Together to Protect American Business
Public/Private partnerships are essential to ensure national and economic security, the FBI-affiliated InfraGard program talks about why and how.