Mediacorp
Rush Hour and Technology in Indonesia
This video explores how technology, particularly mobile apps, has become an integral part of life in Indonesia. It highlights the ways in which these apps solve problems, such as ordering food and services while stuck in traffic, and how...
Curated Video
Choosing Appropriate Units for Descriptive Modeling
In this video, the teacher explains the importance of choosing appropriate units when defining quantities to model a situation. They provide examples from real-life scenarios, such as measuring the success of changes in a store's...
Institute for New Economic Thinking
Brian Arthur: Complexity in Economic Theory - INET Panel (2/5)
Brian Arthur, External Professor at the Santa Fe Institute, speaking as part of the panel Exploring Complexity in Economic Theory at INET's Bretton Woods Conference on April 10, 2011.
All In One Social Media
Planning Your Content Marketing for 2020
You need to have a content marketing calendar for your business to have any chance of success on the internet. But before you dive into the content marketing calendar you need a plan! This video one of two, where I make it INCREDIBLY...
Mediacorp
The Rise of a Controversial Cleric in Indonesia
This video features an interview with Felix Siau, a Chinese Indonesian convert to Islam who has gained popularity as an online preacher. Despite not being an Islamic scholar, Felix has successfully connected with his audience by blending...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Planning
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Mediacorp
The Role of Fake News in Indonesia's Elections
This video highlights the growing importance of social media in political campaigns, specifically in the context of Indonesia's upcoming elections. The video also explores the challenges and opportunities that come with this digital...
Mediacorp
The Power of Mothers in Combating Hoaxes in Indonesia
In this video, a group of Indonesian housewives are being trained to combat fake news through the use of a hoax Buster app. With the rise of extremist groups targeting vulnerable recruits online, these mothers are taking the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Firewalls
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...
IDG TECHtalk
Coronavirus pandemic highlights medical IoT security risks
With more of us connecting with our healthcare providers virtually during the coronavirus pandemic, hackers may find it more appealing to attack medical or hospital systems. Increased amounts of data due to telemedicine and medical...
All In One Social Media
How To Schedule Posts To Facebook - Facebook 101
How To Schedule Posts To Facebook - Facebook 101 // Scheduling posts on Facebook can help you boost your social media presence. Many people ask how to Schedule posts on Facebook and this facebook Tutorial can help you. Learn how to...
Curated Video
CISSP®- Risk Management - Assessment Part 1
This is the first part of a two-part video that shows how to assess and manage risks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Curated Video
Creational Design Patterns in Modern C++ - Game - Introduction
This video highlights an example used for the prototype design pattern. This clip is from the chapter "Prototype" of the series "Creational Design Patterns in Modern C++".This video provides an overview of the cloning types with an...
Science360
Using light to move wireless data faster - Science Nation
Computer science team lights up faster, more secure data transmission to meet future demands Mobile computing is accelerating beyond the smartphone era. Today, people wear smart glasses, smart watches and fitness devices, and they carry...
All In One Social Media
Facebook Ads Tutorial 2022 - How To Create Your FIRST Facebook Ad
Learn how to create your FIRST Facebook Ads with this easy to follow walk-through with Facebook Ads expert, Tom Broschinsky.
Curated Video
Illegal ivory: where does it come from, where does it go?
The illegal ivory trade is big business. A single shipment can be worth up to $1.3m. The vast majority of ivory poached in Africa ends up in China
All Ears English
All Ears English Podcast 1526: Go for a Drive in English with Lindsay and Michelle
All Ears English Podcast 1526: Go for a Drive in English with Lindsay and Michelle
Curated Video
routing protocols : How do routers determine the best route?
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How do routers determine the best route?
Curated Video
Web Development with Node.JS and MongoDB (Video 35)
Web development technology moves at a very fast pace with new tools and techniques being released daily. It is impossible to learn them all, but choosing similar technologies allows you to step up your game while developing web...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Curated Video
routing protocols : Static vs. Dynamic Routing
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Static vs. Dynamic Routing
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...