The 22 Immutable Laws of Branding (Blinkist Summary)
BlinkistThe 22 Immutable Laws of Branding is a practical, hands-on guide to the dos and don’ts of branding as expressed…
The Power of Lists to Get Stuff Done
Paula RizzoBest-selling author Paula Rizzo is so passionate about list making that she wrote two books on the topic: Listful Thinking…
14 Things to Do When You Lose Your Job
MadecraftOver the course of your career, you’ll have ups and downs. There will likely come a time when you’re faced…
21 Opportunities for Better Networking
Dana RobinsonNetworking can benefit you regardless of your career path, boost your business, and enhance your life in significant ways. But…
Job Hunting for College Grads
Elise GelwicksYou’ve worked hard to earn your college degree, and now it’s time to put those years of learning to good…
Get a Remote Data Science Job
MadecraftWorking from home is the new norm. In in-demand fields like data science, employers find they need to offer the…
Vulnerability Management: Assessing the Risks with CVSS v3.1
Lora VaughnVulnerability management can be difficult, and understanding the risks that vulnerabilities pose in your own environment is key to determining…
Oracle Database 19c: PL/SQL
Bob BrylaPL/SQL is the companion programming language to Oracle Database. Having a modern programming language that integrates with the database itself…
C#: Design Patterns Part 1
Richard GoforthDesign patterns are an important part of programming. Rather than programming solutions to every issue from scratch, developers can implement…
15 Mistakes to Avoid in Data Science
MadecraftAs a data scientist, your goal is to always be growing your skills. But, if you realize it or not,…
Azure Administration: Monitor and Back Up Azure Resources
Sharon BennettThe ability to monitor and back up your resources correctly is essential to successfully managing your Azure infrastructure. In this…
CompTIA Security+ (SY0-601) Cert Prep: 5 Physical Security Design and Implementation
Mike ChapplePhysical security is an important part of the CompTIA Security+ curriculum. If someone gets ahold of a company laptop, they…
Social Media Monitoring: Strategies and Skills
Martin WaxmanView Martin’s LinkedIn Newsletter Social media can provide your company with a wealth of information about what your customers—and competitors—really…
California Consumer Privacy Act (CCPA) Essential Training
Mandy HuthThe California Consumer Privacy Act (CCPA) is the first major privacy act to come out of the United States. Instructor…
Designing Highly Scalable and Highly Available SQL Databases
Dan SullivanOnline activities, mobile devices, and Internet of Things (IoT) sensors are generating immense volumes of data. Much of that data…
Unity: Building VR User Interfaces
Roger MillerThe explosion of growth and innovation in the virtual reality (VR) industry has led some to describe it as the…
Google Cloud Platform Essential Training for Administrators
Lynn LangitIs Google Cloud Platform (GCP) right for your business? Explore the offerings of this leading cloud services provider. This course…
The Five Conversations That Deliver Accountability and Performance
Pete Mockaitis | How to Be Awesome at Your JobTraditional feedback often fails because it assumes and prescribes. People let their pent-up emotions and judgments take control, and make…
Make More Money: How to Raise Your Prices
MadecraftRaising your prices can feel awkward, but the procrastination is costing your business a lot of potential revenue. In this…
Cisco DevNet Associate (200-901) Cert Prep 4: Application Deployment and Security
Eric ChouAre you preparing for the Cisco DevNet Associate exam? In this course, instructor Eric Chou covers what you need to…