k_Street Consulting, LLC Blog

How to Use YouTube’s Full Capabilities for Your Business

How to Use YouTube’s Full Capabilities for Your Business

We all know how to use YouTube… find video, click video, watch video. Simple, right?

Sure - if you want to limit how you can leverage it to your business’ advantage. Here, we’ve assembled a few features that you can use to make YouTube a better resource for your business.

First Up: YouTube’s Keyboard Shortcuts

Whether you’re using YouTube as a research tool or presenting your findings in a meeting, effectively using its built-in shortcuts can make your use of the website much more productive (and, let’s face it, more impressive).

If you’re doing research, jumping back to the beginning of a video will be super handy - and is possible, by pressing the 0 (zero) key. You can also use your arrow keys to fast forward or rewind the video in five-second increments (or ten-second increments, if you hold the Ctrl key at the same time).

If you’re using YouTube as a part of a presentation, you can quickly pause and resume the video by pressing either the spacebar, or the K key. If your audience can’t quite hear what you’re presenting, you can adjust the volume using the up and down arrow keys. The M key will mute the video, and unmute it when you’re ready to hear the video again.

Starting From a Specific Point in the Video

Speaking of using YouTube as a part of your presentation, you may not always want a video to start from the very beginning. YouTube gives you a few options to do so - the easiest being grabbing the altered link to your desired time directly from YouTube.

Let’s look at this video about phishing:


There’s a lot of information in this video. What if you want to focus on one specific aspect, like how phishing can be spotted? This video doesn’t dive into this aspect until just about the one-minute mark. YouTube offers a function that eliminates the need of fast-forwarding to this point. Under the Share option, the menu that appears offers a Start at option. You can select the precise time that you want your video to start. The link that appears will begin your video at the moment you have selected (unless a pesky ad gets in the way):


Search Filters to Improve Your Results

If you’re having trouble finding the right content on YouTube, there are filters that you can whittle down your results by - making it more likely that you will find more videos that fit what you are looking for. You can seek out videos that were uploaded during a specific time frame, that fall within a certain duration, and seek out specific channels, playlists, and other media types - among other filters.

YouTube can be one of the greatest resources available today... as long as you can find and share the information you need. For more ways that technology can improve your business and its processes, subscribe to our blog!

Higher Education Using Technology to Manage Operat...
United States Citizens Demand Data Privacy… How Wi...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, April 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tablet Inventory IBM Automobile File Sharing Password analytics Students Customers YouTube Environment Innovation Communication Scalability Content Management Utility Computing Biometric Security Cryptomining History Archive Windows 8 Intranet Tip of the Week Regulation Content Proactive IT Training Mobile Assessment Office Internet Compliance User Going Green Shortcut Touchscreen Budget Television Privacy Insurance Telephone Systems OLED Notifications Consultant Business Mangement Windows 10 Settings Workplace Tips Root Cause Analysis Windows 7 Sports Authentication Content Filtering Remote Monitoring Hacking Printers Fax Server Bing Monitor Meetings Website Antivirus Automation Bandwidth Rootkit Evernote Domains Twitter Samsung Remote Computing Cleaning Hacker Data Warehousing Government Small Business Applications Bloatware Money Update Virtual Reality Multi-Factor Security Remote Work communications WiFi Wire Employer Employee Relationship Hiring/Firing Google Drive Memory Virtual Private Network Efficiency Techology People IT Support Spam Blocking Redundancy Cortana Printer Healthcare Internet exploMicrosoft Software Tips Flash Microsoft Office IT Services How to The Internet of Things Tablets Software as a Service Cybersecurity Lifestyle Webinar Smart Technology CrashOverride BYOD Value Benefits Books Save Money Audiobook Managed Service Provider Unsupported Software Private Cloud Phishing Encryption Business Owner USB Thank You HBO Wireless Network Conferencing Laptop Music BDR Apple Vulnerability Amazon 5G IT Solutions Social Media Entertainment Online Currency Business Continuity Analytic Logistics Managed IT Services Upgrade Administration Computer Two-factor Authentication Cables Windows Patch Management Blockchain Outlook Information Retail Lithium-ion battery Analyitcs Distribution Relocation Virtual Assistant Manufacturing Digital Payment Project Management Machine Learning Pain Points Operating Systems avoiding downtime Amazon Web Services Vendor Management Excel Safety Internet Exlporer Hardware Cameras Email Bring Your Own Device Multiple Versions Specifications Tip of the week Video Games Transportation Accountants Cryptocurrency HaaS Wireless Charging Analysis Cybercrime Employee Computers Computer Care Business Computing Colocation Help Desk Microsoft iphone Database Chrome Microchip App Trending Telephony Customer Relationship Management File Versioning Network Congestion Google Product Reviews Holiday Windows 10 Millennials Backup and Disaster Recovery Save Time Company Culture Touchpad Addiction Customer Service Apps Data Shadow IT Content Filter Human Resources Google Apps Worker Wiring Fraud Netflix Sync Document Management Emails Entrepreneur Security Screen Mirroring Downtime Flexibility Smart Tech Digital Signature VoIP Recovery Android Frequently Asked Questions Knowledge Science Voice over Internet Protocol Experience Search Engine Public Computer LinkedIn Data Recovery End of Support Smart Office IoT Cache Collaboration Hard Drives DDoS HVAC Physical Security Programming E-Commerce NIST eCommerce Cloud Computing Public Cloud Infrastructure webinar Quick Tips Social Engineering Network Security Outsourced IT Scam Legal Office 365 Strategy Tech Support Botnet Hybrid Cloud Law Enforcement Hackers Wi-Fi Hosted Solution Business Management Software Statistics Word Computing Infrastructure VPN IT Support HIPAA Staff Fiber-Optic IaaS Camera Phone System Virtualization Robot Mobility Shortcuts Browser User Error Business Intelligence Nanotechnology IT Consultant Managed IT Best Available Instant Messaging Social Google Search Mobile Device Storage Access Control Education Read Electronic Medical Records Credit Cards Hring/Firing Facebook Windows Media Player Cast Wireless Internet Smartwatch Spam eWaste Paperless Office Work/Life Balance How To Thought Leadership Distributed Denial of Service Wireless Technology Data Management Search Leadership Identity Theft Reputation Hosted Computing Emergency Mobile Office Internet of Things Congratulations Workforce Uninterrupted Power Supply Start Menu Marketing Virtual Desktop Mobile Device Management User Tips Data Backup Employee/Employer Relationship Smartphones SaaS Digital Signage PowerPoint Information Technology Humor Windows 10s Productivity Biometrics Cost Management Business Disaster Recovery Password Manager Data Storage Office Tips Chromecast Application Comparison Warranty Saving Money Data storage Audit Gaming Console Firewall Bluetooth Point of Sale Managed IT Services Safe Mode Enterprise Content Management Vendor Telephone System Printer Server Keyboard Telecommuting OneNote IT service Productivity Administrator Professional Services Backup Social Networking Employer-Employee Relationship CES Worker Commute ISP Connectivity Regulations Servers IT Plan IT solutions Unified Threat Management Health Proactive Battery Restore Data Data Protection Gmail Unified Communications Theft Password Management FENG Hosted Solutions Electronic Health Records Managing Stress travel Data Breach Gadgets Tech Term Operating System Miscellaneous Loyalty Two Factor Authentication Devices Business Technology Politics malware Practices Charger Mouse Line of Business Windows Server 2008 Security Cameras Managed Service Ransomware Best Practice Advertising Troubleshooting Artificial Intelligence Workers Criminal Computer Accessories Streaming Media Online Shopping Wearable Technology Google Docs Users Router WIndows 7 GDPR Server Data Security Mobile Devices Black Market Cloud Alert Smartphone PDF Supercomputer Current Events Tools Solid State Drive Computer Repair Risk Management Display SharePoint Best Practices Remote Worker Passwords Maintenance Net Neutrality Virus MSP Data loss Skype Technology Networking Big data Remote Monitoring and Maintenance Computer Fan Files NarrowBand IT Management Recycling Saving Time Augmented Reality Running Cable Mobile Computing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *