Instructional Video3:21
Mediacorp

Rush Hour and Technology in Indonesia

12th - Higher Ed
This video explores how technology, particularly mobile apps, has become an integral part of life in Indonesia. It highlights the ways in which these apps solve problems, such as ordering food and services while stuck in traffic, and how...
Instructional Video4:23
Curated Video

Choosing Appropriate Units for Descriptive Modeling

K - 5th
In this video, the teacher explains the importance of choosing appropriate units when defining quantities to model a situation. They provide examples from real-life scenarios, such as measuring the success of changes in a store's...
Instructional Video18:06
Institute for New Economic Thinking

Brian Arthur: Complexity in Economic Theory - INET Panel (2/5)

Higher Ed
Brian Arthur, External Professor at the Santa Fe Institute, speaking as part of the panel Exploring Complexity in Economic Theory at INET's Bretton Woods Conference on April 10, 2011.
Instructional Video6:22
All In One Social Media

Planning Your Content Marketing for 2020

Higher Ed
You need to have a content marketing calendar for your business to have any chance of success on the internet. But before you dive into the content marketing calendar you need a plan! This video one of two, where I make it INCREDIBLY...
Instructional Video5:24
Mediacorp

The Rise of a Controversial Cleric in Indonesia

12th - Higher Ed
This video features an interview with Felix Siau, a Chinese Indonesian convert to Islam who has gained popularity as an online preacher. Despite not being an Islamic scholar, Felix has successfully connected with his audience by blending...
Instructional Video7:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Planning

Higher Ed
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
Instructional Video5:37
Mediacorp

The Role of Fake News in Indonesia's Elections

12th - Higher Ed
This video highlights the growing importance of social media in political campaigns, specifically in the context of Indonesia's upcoming elections. The video also explores the challenges and opportunities that come with this digital...
Instructional Video13:46
Zach Star

Math and Physics of the Everyday

12th - Higher Ed
Math and Physics of the Everyday
Instructional Video4:09
Mediacorp

The Power of Mothers in Combating Hoaxes in Indonesia

12th - Higher Ed
In this video, a group of Indonesian housewives are being trained to combat fake news through the use of a hoax Buster app. With the rise of extremist groups targeting vulnerable recruits online, these mothers are taking the...
Instructional Video11:17
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Firewalls

Higher Ed
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet...
Instructional Video11:38
IDG TECHtalk

Coronavirus pandemic highlights medical IoT security risks

Higher Ed
With more of us connecting with our healthcare providers virtually during the coronavirus pandemic, hackers may find it more appealing to attack medical or hospital systems. Increased amounts of data due to telemedicine and medical...
Instructional Video2:29
All In One Social Media

How To Schedule Posts To Facebook - Facebook 101

Higher Ed
How To Schedule Posts To Facebook - Facebook 101 // Scheduling posts on Facebook can help you boost your social media presence. Many people ask how to Schedule posts on Facebook and this facebook Tutorial can help you. Learn how to...
Instructional Video7:58
Curated Video

CISSP®- Risk Management - Assessment Part 1

Higher Ed
This is the first part of a two-part video that shows how to assess and manage risks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video3:30
Curated Video

Creational Design Patterns in Modern C++ - Game - Introduction

Higher Ed
This video highlights an example used for the prototype design pattern. This clip is from the chapter "Prototype" of the series "Creational Design Patterns in Modern C++".This video provides an overview of the cloning types with an...
Instructional Video3:34
Science360

Using light to move wireless data faster - Science Nation

12th - Higher Ed
Computer science team lights up faster, more secure data transmission to meet future demands Mobile computing is accelerating beyond the smartphone era. Today, people wear smart glasses, smart watches and fitness devices, and they carry...
Instructional Video7:43
All In One Social Media

Facebook Ads Tutorial 2022 - How To Create Your FIRST Facebook Ad

Higher Ed
Learn how to create your FIRST Facebook Ads with this easy to follow walk-through with Facebook Ads expert, Tom Broschinsky.
Instructional Video1:05
The Business Professor

Banner Advertising

Higher Ed
Explanation of Banner Advertising
Instructional Video2:16
Curated Video

Illegal ivory: where does it come from, where does it go?

12th - Higher Ed
The illegal ivory trade is big business. A single shipment can be worth up to $1.3m. The vast majority of ivory poached in Africa ends up in China
Instructional Video18:19
All Ears English

All Ears English Podcast 1526: Go for a Drive in English with Lindsay and Michelle

Pre-K - Higher Ed
All Ears English Podcast 1526: Go for a Drive in English with Lindsay and Michelle
Instructional Video3:32
Curated Video

routing protocols : How do routers determine the best route?

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How do routers determine the best route?
Instructional Video5:07
Curated Video

Web Development with Node.JS and MongoDB (Video 35)

Higher Ed
Web development technology moves at a very fast pace with new tools and techniques being released daily. It is impossible to learn them all, but choosing similar technologies allows you to step up your game while developing web...
Instructional Video9:48
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Common Attacks and Mitigations

Higher Ed
Public servers are subjected to many types of attacks that can be mitigated by hardening the network and host using a wide variety of methods. This episode covers common attacks include DDoS, URL hijacking/redirection, session replay,...
Instructional Video5:19
Curated Video

routing protocols : Static vs. Dynamic Routing

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Static vs. Dynamic Routing
Instructional Video8:02
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Network Protocol Analyzers

Higher Ed
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use...