Hi, what do you want to do?
Music Matters
Fluid Basslines - Inside the Mind of Bach
Join us as we examine the choice of harmony, chromatic chords, secondary dominants, borrowed chords. and modulation, the part writing, the use of inessential notes and suspensions, plus other features of the Bach Chorale style. Useful...
Sustainable Business Consulting
Tools for Managing Sustainability Part 1
Discusses two out of three tools to use when managing for sustainability: SWOT Analysis and Gap Analysis
KnowMo
Solving 3D Problems using Pythagoras and Trigonometry
The video is an electric presentation on how to solve problems in 3D by breaking them down into their 2D components. The focus is on using Pythagoras and trigonometry to find missing lengths and angles. The presenter provides...
Music Matters
Is this the Greatest English Work of the 17th Century? - Composer Insights
The famous Dido’s Lament from ‘Dido and Aeneas’ by Henry Purcell. Features of Purcell’s style are unpacked and the word painting & emotional life of the music are explored. A Ground Bass is repeated 11 times, while the melodic line and...
Healthcare Triage
Reality Show Stars: They're Not Just Like Us
There's a lot of news this week touting a study that suggests exercise is the key to maintaining a weight loss. Welp. Guess what? It wasn't a great study. There were 14 participants, all of whom appeared on the TV reality show The...
Sustainable Business Consulting
Governance and Getting Started
Lays out the basic structure for implementing a green team and provides tips on how to maximize your efforts
Odd Quartet
How to Get From Chord To Chord - Voice Leading Music Theory
Today we're going to look at voice leading. Voice leading is a way to get from chord to chord in music that makes it sound connected (and can make it easier for musicians to play). First, we will take a chord progression, add a bass line...
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Software development methodologies part 2
CISM Domain 1: Information Security Governance: Software development methodologies part 2
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1:...
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1:...
Physical and Health Education
Tennis - Backhand technique
Teaching points for the backhand technique in the game of tennis.
IDG TECHtalk
Most common cyberattack techniques of 2020
Research on the most common techniques attackers used to breach systems provides insight on where to focus your defenses.
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Policies, procedures, guidelines, and frameworks
CISM Domain 1: Information Security Governance: Policies, procedures, guidelines, and frameworks
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1:...
r/>
This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1:...
Curated Video
Apache Maven Beginner to Guru - Introduces you to the Maven basics
This video introduces you to the Maven basics.
r/>
This clip is from the chapter "Maven Basics" of the series "Apache Maven: Beginner to Guru".This section focuses on the Maven basics, such as Maven coordinates, Maven...
r/>
This clip is from the chapter "Maven Basics" of the series "Apache Maven: Beginner to Guru".This section focuses on the Maven basics, such as Maven coordinates, Maven...
The Business Professor
Hawthorne Experiments
Dr. Kyle Huff explains what are the Hawthorne Experiments
Music Matters
Writing Counterpoint - Combining Counterpoint with Harmony
Learn how to write and compose counterpoint combined with homophony. Counterpoint is an advanced music composition technique that involves weaving together multiple melody lines. Working in a Baroque style, this video demonstrates how...
Sustainable Business Consulting
Six Fundamentals to Sustainability Strategy
Describes the six fundamentals to integrating sustainability throughout your company
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Scanners
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance.
r/>
This clip is from the chapter "Tools of the...
r/>
This clip is from the chapter "Tools of the...
Curated Video
Bass Instruments and their Role in Music
An introduction to sound and purpose of bass instruments. Bass instruments have the lowest pitch of the musical instruments in an ensemble and help set the beat of the music. Learn about bass instruments such as electric bass, double...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Database security
CISSP Domain 7: Security Operations: Database security.
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
r/>
This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and Engineering...
Physical and Health Education
Tennis - Serving
Teaching points for the technique of serving in the game of tennis.
IDG TECHtalk
How to prevent attackers from exploiting Windows privileges
Ransomware and other attackers will often try to escalate privileges once inside Windows systems. These tips can make that harder to do.
IDG TECHtalk
Guide to key Windows 10 event logs you need to monitor
These are the event logs that will help you identify malicious activity on your network.
Curated Video
CSS Bootcamp: Master CSS (Including CSS Grid/Flexbox) - Flex Container Properties
Flexbox: Flex Container Properties<br/<br/>>
This clip is from the chapter "Flexbox" of the series "CSS Bootcamp: Master CSS (Including CSS Grid/Flexbox)".Learn about Flexbox here
This clip is from the chapter "Flexbox" of the series "CSS Bootcamp: Master CSS (Including CSS Grid/Flexbox)".Learn about Flexbox here
Odd Quartet
Voice Leading Music Theory
Today we're going to look at voice leading. Voice leading is a way to get from chord to chord in music that makes it sound connected (and can make it easier for musicians to play). First, we will take a chord progression, add a bass line...
Packt
CompTIA Network+ Certification N10-007: The Total Course - System Monitoring
This video shows how to monitor the system for useful information. This clip is from the chapter "Network Monitoring" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn about SNMP,...