Hi, what do you want to do?
Brainwaves Video Anthology
Jeff Utecht - Community Trumps Content
Jeff Utecht is an educational technology consultant, educator and author. He holds a Master’s degree in Curriculum and Instruction with a focus in Technology as well as his administrative certification through Washington State....
Ti & Me TV
Advice For Dancers About Booking Choreography Jobs
Hello my sweet loves! Today we chat about how to book choreography jobs, specifically at dance studios. I started out professionally choreographing when I was 18 years old and I have a learned a whole lot since then. In this dance advice...
Blockchain Central
Private and Public Keys Explained | Blockchain Central
This week on Blockchain Central: we'll talk about private and public keys, see how they are used, and why they matter in the world of crypto. We will also have a look at the level of safety that asymmetric encryption provides and how it...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Bayes Theorem and Naive Bayes
From the section: Machine Learning: Part 2. In this section, we’ll cover Bayes Theorem, Naive Bayes, SVM and SVC to classify data.<b<br/>r/>
Machine Learning: Part 2: Bayes Theorem and Naive Bayes
Machine Learning: Part 2: Bayes Theorem and Naive Bayes
The Wall Street Journal
A Cyber Rethink
Are companies doing the right things, measuring the right things and structured in the right way to manage current and coming threats? We examine how to structure security staff and policy to be ready for next new threats.
All In One Social Media
Content Marketing Strategy to Get Leads, Make Sales, & Build A Buying Community
I'm not here to mess around, the whole point of Content Marketing is to Get Leads. But that is easier said than done, so in this video, I am going to show you how to build a Content Marketing Strategy to Get Leads, Make Sales, & Build A...
Tarver Academy
How to use Resource Calendars to reserve items in GOOGLE CALENDAR
In This Episode, Tyler Teaches Us About How to use Resource Calendars to reserve items in GOOGLE CALENDAR
Coach Dan Blewett
The College Baseball Recruiting Process - Ask Dan Blewett
Want to play college baseball? Learn about the recruiting process and what you should be doing to get there in this video by Coach Dan.
Coach Dan Blewett
College Baseball & Softball Recruiting Tips: How to Find a College Coach's Email
Learn how to find a college coach's email in this video. College recruiting for baseball and softball can be difficult, and even the simple things can be a huge time waste if you're new at it. If you're looking for ways to get started...
Curated Video
Are You Being Spied On?
Should the US government be allowed to spy on its citizens to protect society as a whole? There are arguments for and against – but the Big Brother state isn't a conspiracy theory, it's real!
Tarver Academy
How to Restrict Student Access in Google Classroom
In This Episode, Tyler Teaches Us About How to Restrict Student Access in Google Classroom
Curated Video
Explain web security : What is Reconnaissance?
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks.
The goal of this video is to get an overview of the first step of ethical...
The goal of this video is to get an overview of the first step of ethical...
All In One Social Media
How to Use Facebook Business Manager in 2021!
Facebook is always updating its interface and Business Manager is no different. In this video I will show you how to use the updated Facebook Business Manager and give you everything you need to get started!
Easy Languages
22 English Abbreviations You Should Know! | Easy English 69
22 English Abbreviations You Should Know! | Easy English 69
Easy Languages is an international video project aiming at supporting people worldwide to learn languages through authentic street interviews and expose the street...
Easy Languages is an international video project aiming at supporting people worldwide to learn languages through authentic street interviews and expose the street...
The Wall Street Journal
How to Plan Communications Around Cyber Incidents
Three cyber executives discuss how they plan communications around cyber incidents, and how they make critical decisions about what to communicate, when and to whom.
Packt
Importance of Locator Identifiers in Selenium
This video explains the importance of locator identifiers in Selenium.
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver with Java - Basics to Advanced and...
<
br/>
This clip is from the chapter "Locator Techniques and Tools used to Identify Objects" of the series "Selenium WebDriver with Java - Basics to Advanced and...
Next Animation Studio
North Korean hackers stole sensitive information from Microsoft users
Microsoft has filed a lawsuit against two anonymous North Korean hackers for stealing user information in a hacking operation called Thallium.<br/>
All In One Social Media
Make Better Content By Making LESS and DOING MORE!
If there is anything we are all struggling with it is time but how are you supposed to make better content ALL the time? Easy! Make less content and market what you have more. In this video, i am going to share with you how you can...
Tarver Academy
How to Star an Important Email GMAIL
In This Episode, Tyler Teaches Us About How to Star an Important Email GMAIL
EL Consulting
Setting Objectives for Team Success: A Discussion with a Manager and Employee
In this video, a team discusses their objectives for the year and how each member can contribute to achieving them. They identify communication and training as areas for improvement and discuss strategies for addressing these issues,...
The Business Professor
Types of Writing to satisfy the Statute of Frauds
This Video Explains Types of Writing to satisfy the Statute of Frauds
Curated Video
Describe the different types of malware that could affect a computer system or network : Keyloggers and Information Stealers
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
friEdTech
Smarter Gmail Series: Lesson 1 Inbox Zero & Priority Inbox
Learn to use your Gmail SMARTER not HARDER in this humble little series. This is episode one where you learn the extremely basic basics of "Inbox Zero" (the theory that makes everything in Gmail make sense) and Priority Inbox.
All In One Social Media
How To Get Likes On Your Facebook Business Page
How To Get Likes On Your Facebook Business Page // How To Get Facebook Page Likes is one of the commonly asked questions that all businesses which they could master. How To Get LIkes is all down to engagement, consistency and a little...