Hi, what do you want to do?
TED Talks
Peter Beck: Small rockets are the next space revolution
We're in the dawn of a new space revolution, says engineer Peter Beck: the revolution of the small. In a talk packed with insights into the state of the space industry, Beck shares his work building rockets capable of delivering small...
TED Talks
TED: Your phone company is watching | Malte Spitz
What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830...
SciShow
5 of the Worst Computer Viruses Ever
Michael Aranda explains five of the worst computer viruses that have hit the net!
Bozeman Science
Cell Communication
Paul Andersen discusses cell communication. He begins by explaining how he communicates with other individuals using various forms of electronic communication. He them explains how cells communicate when the distance between them is...
SciShow
How the Internet Was Invented | The History of the Internet, Part 1
The Internet is older than you might think!
SciShow
What Happens to an Email After You Click "Send"?
Email is one of the most essential things to our life. But do you actually know what happens when you click the "send" button, and how it's sent to your friends?
Crash Course
The Secret to Business Writing: Crash Course Business - Soft Skills
In business, you need to know how to write. And that involves learning a bunch of things like knowing who you're writing to and what kind of thing you're writing. In this episode of Crash Course Business Soft Skills, Evelyn talks to us...
Curated Video
The Beginners 2025 Cyber Security Awareness Training Course - Targeted Email Phishing Part II
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them.
Curated Video
How to Avoid Spam E-mail
Howcast - Make it harder for spammers to clog your inbox with ads and scams.
Curated Video
Sam Bankman-Fried addresses Musk email to federal employees as he breaks his silence on X after two years
Sam Bankman-Fried addresses Musk email to federal employees as he breaks his silence on X after two yearsSource: Various
Curated Video
Inbox Zero: Mastering Email Management
Feeling overwhelmed by an overflowing inbox? Discover how to achieve Inbox Zero and master email management with these proven strategies. This video covers effective techniques to turn email chaos into order, enhancing your productivity...
The Business Professor
Personal Elevator Pitch - Closing Out and Following Up
Personal Elevator Pitch - Closing Out and Following Up
The Business Professor
Professionalism - Office Visitors
This Video Explains Professionalism - Office Visitors
The Business Professor
Professionalism - Email Etiquette
This Video Explains Professionalism - Email Etiquette
Curated Video
Increase Your Email Responses: How to Get People to Respond to Emails
Do you want to increase your email responses? I expect you do.
After all, you take the trouble to craft your email. So why wouldn't you want people to resp
ond to it?
Project...
After all, you take the trouble to craft your email. So why wouldn't you want people to resp
ond to it?
Project...
Curated Video
Using Communication Technology
Miss Palomine uses her cell phone to find her friend at an amusement park. This leads to a discussion of the benefits of current communication technologies, like the cell phone and email.
Curated Video
Let’s Communicate About Communication
Miss Palomine gives the student an overview of how communication and related devices have changed.
Curated Video
SkillSprints: Understanding and Preventing Phishing Emails
Phishing is a major cybersecurity problem. In this video you'll learn how to identify Phishing emails and properly dispose of them when you receive them.
Hip Hughes History
The Hatch Act Explained
Did James Comey violate the Hatch Act? What is the Hatch Act?
Curated Video
Business Email Compromise
The video explains the phishing attack of BEC, how it originates and what are the tricks used on employees