Instructional Video4:39
Curated Video

AWS Certified Solutions Architect Associate (SAA-C02) Exam Prep Course - Self-Managed DB Solutions

Higher Ed
This video introduces you to self-managed DB solutions. This clip is from the chapter "High Performance Architectures" of the series "AWS Certified Solutions Architect Associate (SAA-C02) Exam Prep Course".This video introduces you to...
Instructional Video8:03
Brian McLogan

Solve a System of Equations with Three Variables Step by Step

12th - Higher Ed
👉 In this video I will work through two examples of solving a system of equations with three variables step by step. We will apply substitution and elimination to help use solve for the values that makes the system true. Timestamps: 0:00...
Instructional Video3:26
Curated Video

HVACR Deadband Basics

Higher Ed
How do we used deadbands to control temperature in hvac heating and cooling systems?
Instructional Video5:06
Curated Video

Azure Data Factory for Beginners - Build Data Ingestion - Introduction to the Course

Higher Ed
This video provides an introduction to the course and basics of ADF. This clip is from the chapter "Introduction - Build Your First Azure Data Pipeline" of the series "Azure Data Factory for Beginners - Build Data Ingestion".Introduction...
Instructional Video0:52
Science360

What is synthetic biology?

12th - Higher Ed
What is synthetic biology? Catherine Royer, professor of biology at Rensselaer Polytechnic Institute, answers the question on this edition of "Ask a Scientist."
Instructional Video3:37
Brainwaves Video Anthology

Tanya Katerí Hernández - Critical Race Theory

Higher Ed
Tanya Katerí Hernández is the Archibald R. Murray Professor of Law at Fordham University School of Law, where she teaches Anti-Discrimination Law, Comparative Employment Discrimination, Critical Race Theory, The Science of Implicit Bias...
Instructional Video1:04
IDG TECHtalk

How to use the blkid command: 2-Minute Linux Tips

Higher Ed
In this Linux tip, learn how to use the blkid command. It gives you a very useful view of block devices on your Linux system. First, it shows the devices (e.g., /dev/sda1). It shows the UUIDs (the 128 bit long "universally unique...
Instructional Video2:39
IDG TECHtalk

Linux tip: Learn to use display release commands

Higher Ed
In this tip, we look at commands that identify the version of Linux in use on a Linux system – the lsb_release and uname commands. Leave a comment and let us know which command you want featured in a future Linux Tips video.
Instructional Video4:21
IDG TECHtalk

How to avoid using RDP in Windows

Higher Ed
Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.
Instructional Video3:23
Curated Video

World of Computer Networking Your CCNA start - Open Systems Interconnection (OSI) versus Transmission Control Protocol/Internet Protocol (TCP/IP) Model

Higher Ed
This video highlights the difference between the OSI and TCP/IP model. This clip is from the chapter "Bits and Bytes" of the series "World of Computer Networking: Your CCNA start".This section provides an introduction to bits and bytes...
Instructional Video3:30
Curated Video

Linux Administration Bootcamp: Go from Beginner to Advanced - Course Overview

Higher Ed
This clip is from the chapter "Overview" of the series "Linux Administration Bootcamp: Go from Beginner to Advanced".This section presents an overview of the course.
Instructional Video7:40
Curated Video

CompTIA A+ Certification 220-1001: The Total Course - Choosing a Power Supply

Higher Ed
Power supplies come in a dizzying array of the power ratings, sizes and efficiencies. A good tech understands these factors to make sure a system has the power it needs. This clip is from the chapter "Power Supplies" of the series...
Instructional Video4:15
Curated Video

Bug Bounty Program Certification 2.6: Various Components of Network Bug Bounty Program

Higher Ed
This video explores components of bug bounty program. • Explore components of bug bounty program • Various components of network bug bounty program • Explain functioning of a network bug bounty program
Instructional Video4:31
Science360

ELEVATOR PITCH: Real people. Real elevators. (Ep. 2)

12th - Higher Ed
What if you had just a few seconds to sell an idea? Entrepreneurs encounter this situation every day. Often, so do people funded by the National Science Foundation’s Small Business Innovation Research and Small Business Technology...
Instructional Video2:32
NASA

NASA | Back to the Moon. It's Official.

3rd - 11th
After a four and a half day journey from the Earth, the Lunar Reconnaissance Orbiter, or LRO, has successfully entered orbit around the moon. Engineers at NASA's Goddard Space Flight Center in Greenbelt, Md., confirmed the spacecraft's...
Instructional Video7:51
Curated Video

AWS Solutions Architect Associate (SAA-C02) Exam Prep Course - 2021 UPDATED! - Multi-Factor Authentication

Higher Ed
This video explains the multi-factor authentication process. This clip is from the chapter "Solutions Architect Chapter 7 - Identity and Access Management (IAM)" of the series "AWS Solutions Architect Associate (SAA-C02) Exam Prep Course...
Instructional Video7:46
Curated Video

The Complete Practical Docker Guide - Installing Docker Engine on Linux

Higher Ed
This video demonstrates the installation of Docker Engine on Linux. This clip is from the chapter "Docker Installation" of the series "The Complete Practical Docker Guide".This section focuses on the installation of Docker Engine and...
Instructional Video3:57
Brian McLogan

Tutorial - How do we solve a system of linear equations using any method (x+3)/4+(y-1)/3 =1, 2x-y=12

12th - Higher Ed
Learn how to solve a system of equations by using any method such as graphing, elimination and substitution. (x+3)/4+(y-1)/3 =1, 2x-y=12
Instructional Video7:25
Packt

CompTIA A+ Certification 220-1001: The Total Course - Dealing with Threats

Higher Ed
Once you understand threats, you can mitigate those threats by reducing vulnerabilities. This episode covers the core tools and actions you must do as a tech to reduce threats. These tools and actions include patching software, running...
Instructional Video1:45
Curated Video

Robotic Process Automation - UiPath RPA Developer Masterclass - RPA - Capabilities

Higher Ed
In this video, you will learn what capabilities the technology has and what systems, applications, and platforms RPA software can interact with. This clip is from the chapter "Introduction to RPA and Its Working Methodology" of the...
Instructional Video2:03
Curated Video

Risk Management 101 for IT Professionals Essential Concepts - The Elements of Risk

Higher Ed
This video explains the elements of risk. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Instructional Video4:55
Curated Video

Elasticsearch 7 and Elastic Stack - In Depth and Hands On! - Introducing Logstash

Higher Ed
This video provides an introduction to Logstash. This clip is from the chapter "Importing Data into Your Index (Big or Small)" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This section explains how to import...
Instructional Video8:23
Curated Video

Elasticsearch 7 and Elastic Stack - In Depth and Hands On! - Importing Data with a Script

Higher Ed
This video explains how to import data with a script. This clip is from the chapter "Importing Data into Your Index (Big or Small)" of the series "Elasticsearch 7 and Elastic Stack - In Depth and Hands On".This section explains how to...
Instructional Video17:59
Curated Video

Dive Into Ansible - From Beginner to Expert in Ansible - Ansible Modules

Higher Ed
This video explains the different modules in Ansible and explains how to interact with Ansible command line tools. This clip is from the chapter "Ansible Architecture and Design" of the series "Dive Into Ansible - From Beginner to Expert...