Instructional Video0:53
Next Animation Studio

Malaysia's Automated Enforcement System explained

12th - Higher Ed
A system of automated traffic cameras known as the Automated Enforcement System (AES) went into service across Malaysia in September. The AES has been installed at accident black spots and other locations across the country in an attempt...
Instructional Video0:56
The March of Time

1949: NEW YORK TRAFFIC PLANNING: LA WS The Municipal Building, NY. REPRISAL: VS Chairman of NYC Planning Commission Robert F. Wagner Jr. (1910-1991) in office w/ men '...w/ good intelligent planning, we can begin... to unsnarl the traffic problem...'

12th - Higher Ed
MOT 1949: NEW YORK TRAFFIC PLANNING: LA WS The Municipal Building, NY. REPRISAL: VS Chairman of NYC Planning Commission Robert F. Wagner Jr. (1910-1991) in office w/ men '...w/ good intelligent planning, we can begin... to unsnarl the...
Instructional Video5:20
Curated Video

Describe cyber attacks that could affect a computer system or network : Types of man-in-the-middle Attack

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know about what is...
Instructional Video21:22
SWPictures

WHAT A WASTE - The People's City

12th - Higher Ed
One of the biggest challenges facing planners and politicians is public transport, especially when so many systems are close to breaking point. The new system in Bogota in Colombia is being heralded as one of the best examples in the...
Instructional Video7:59
Rachel's English

English Conversation - Real Life English! - Meet Stoney

6th - Higher Ed
Study real English conversation as friends and family visit our new baby, Stoney. See 'gonna' in practice, dropping the H reductions, the reduction of 'did', and more!
Podcast21:11
NASA

‎NASA in Silicon Valley: Michelle Eshow Talks About How NASA Is Working To Improve Air Travel For Everyone

Pre-K - Higher Ed
A conversation with Michelle Eshow, Software Lead for Air Traffic Management at NASA’s Ames Research Center in Silicon Valley.
Instructional Video3:45
Curated Video

Google Maps Secrets: How Exactly Does Google Maps Work?

Pre-K - Higher Ed
How Google Maps work? How does Google Maps know about the traffic conditions? How is it so accurate about predicting traffic conditions? This is a short, animated videos for kids and laymen to understand the science and technology that...
Instructional Video7:11
Curated Video

routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
Instructional Video2:15
Programming Electronics Academy

No Chicken Joke Analogy :: Arduino Crash Course

Higher Ed
Will the Chicken Cross the Road? So there's this chicken, and he's on the side of the road. He wants to cross the road. He wants to get to the other side. Before he steps out and crosses the road, he looks both ways. That is a rational...
Instructional Video8:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - ARP Cache Poisoning

Higher Ed
ARP is used to resolve an IP address to a 48-bit hexadecimal hardware MAC address. Attackers with network access can fraudulently send ARP updates to hosts in order to force network traffic through the attacker station. This clip is from...
Instructional Video0:55
Next Animation Studio

Ford, Vanderbilt study proposes traffic jam solution

12th - Higher Ed
New research by Ford and Vanderbilt University may have a new solution to traffic jams.
Instructional Video11:13
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The CIA Triad - Part 2 - Confidentiality, Integrity, and Availability

Higher Ed
This is the second part of a two-part video that explains the CIA triad. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP®...
Instructional Video36:45
The Wall Street Journal

Elon Musk on His Tech Empire and the Role of Government

Higher Ed
Elon Musk discusses his concerns about the national deficit, government subsidies, rules and regulations as well as updates on his most innovative projects such as Cybertruck, Nuralink and Starship.
Instructional Video1:07
Next Animation Studio

Paris plans to make itself even more beautiful

12th - Higher Ed
The world’s most amazing city has decided to spend 305 million dollars to make itself even more beautiful.
Instructional Video6:15
Curated Video

routing protocols : Static Routes and Dynamic Routes

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Static Routes and Dynamic Routes
Instructional Video5:54
Curated Video

routing protocols : Routed protocols and Demonstrations

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Routed protocols and Demonstrations
Instructional Video4:24
Sustainable Business Consulting

Commuting Case Studies

Higher Ed
Case studies of companies saving money through reducing employee commuting and incentivizing other modes of transportation
Instructional Video6:38
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Elastic Load Balancers (ELB)

Higher Ed
In this video, we'll learn about Elastic Load Balancers (ELB). This clip is from the chapter "AWS Compute Services" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for 2021]".This section is about AWS compute services...
Instructional Video9:03
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints

Higher Ed
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Instructional Video10:07
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Virtual Private Networks (VPNs)

Higher Ed
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or...
Instructional Video9:55
Curated Video

Bug Bounty Program Certification 5.3: Perform Denial of Service Attack on Server

Higher Ed
This video will help you understand DOS attack process • Use LOIC tool to perform DOS attack • Attack on other systems in network • Monitor DOS attack using Wireshark
Instructional Video11:33
Curated Video

Increasing the Price of Petrol: IELTS Answers - IELTS Energy Podcast 1182

9th - Higher Ed
One of the toughest questions you can get for IELTS Writing Task 2 is about increasing prices of petrol in a mixed essay question- a combination of an opinion and a problem solution question. Today we'll tell you the highest-scoring way...
Instructional Video3:25
All In One Social Media

Content Marketing Strategy - 6 Steps to Effective Content Marketing Goals

Higher Ed
Your content marketing needs to have a point and the point is to get sales, engagement, and community. But how are you supposed to set those goals? Or where to even start? i break down for you what you need to do to determine what your...
Instructional Video9:35
Curated Video

AWS Certified Cloud Practitioner (CLF-C01)- Additional Networking Services

Higher Ed
This video is about AWS networking and content delivery: additional networking services. This clip is from the chapter "AWS Networking and Content Delivery" of the series "AWS Certified Cloud Practitioner (CLF-C01) [Updated for...