National Institute of Standards and Technology
Keynote Remarks of Vivek Kundra - U.S. Chief Information Officer
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workship II November 4-5, 2010 to update government and industry stakeholders on developing cloud standards. Federal CIO Vivek Kundra...
Mazz Media
Lab Safety: Dressing Appropriately
In this live-action program viewers will learn the importance of dressing appropriately while in a laboratory setting. Students will come to understand that the effects of an accident will be reduced and minimized by wearing personal...
Global Ethics Solutions
Ethics & Ingorance - Avoiding Unnecessary Crises at Work
Many ethical crises are the result of ignorance, yet there is no excuse for ignorance. In this course you will learn why knowledge and common sense provide the best defense against ignorance and the ethical knowledge you must know when...
Institute for New Economic Thinking
Government as the Solution, not the Problem
In part 1 of INET's interview with Fred Block, he says that government investment in innovation is essential: in fact, even during the era of Ronald Reagan, the US government played a key role in developing new technologies and the Internet
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Introduction to Various Defense Approaches to Adversarial Attacks
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to give an overview of different defense...
TLDR News
Labour’s 2017 Manifesto Explained in 5 Minutes
The Labour's 2017 Manifesto is very long, and most people don't bother reading it. So I'll sum it all up really quick, then you won't need to read it.
Next Animation Studio
North Korea destroys north-south joint liaison office: report
North Korea blew up the joint liaison office in the border city of Kaesong used for bettering ties with South Korea after days of rising tensions on June 16.
The Business Professor
Comprehensive Environmental Response, Compensation, and Liability Act of 1980
Comprehensive Environmental Response, Compensation, and Liability Act of 1980
Hip Hughes History
The 1956 Election Explained.
A summary of the electoral re-match between President Eisenhower and Adlai Stevenson.
The Business Professor
Understanding the Age Discrimination in Employment Act
This video provides an explanation of the Age Discrimination in Employment Act (ADEA) and its key provisions. It also explains the remedies available under the ADEA including reinstatement, lost wages, and sometimes additional damages...
Next Animation Studio
U.S., China conducting multiple military exercises near Taiwan
The U.S. and China have conducted numerous exercises in the Pacific over the past few weeks, stoking fears of a looming confrontation over Taiwan.
Hip Hughes History
Amanda Knox Retrial Verdict: What Happens Next? Extradition Explained in 3 Minutes
With the retrial and murder conviction of Amanda Knox, many Americans are wondering if she will be extradited to Italy to face her 28 year sentence. In this video we explain the concept of extradition and what options Amanda Knox faces...
TLDR News
Brexit Party Manifesto Explained (2019 Election) - TLDR News.
On Friday the Brexit Party announced their new manifesto, or actually their 'Contract with the People'. We read all of this over 24-page document and compressed it into a few minutes to make understanding their policies easier!
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Comparing Defence Approaches and Choosing the Best Defence
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to provide guidance on choosing the best...
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defence from Modified Input Category
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show a practical example of defense...
The Business Professor
Personal Defenses to Negotiable Instrument
Personal Defenses to Negotiable Instrument
Curated Video
A Lawyer's Journey From Law Student to Founder of a Law Firm
This video features criminal defense lawyer Benjamin Brafman sharing insights on his life and career in the legal field. He talks about his work ethic and how it has contributed to his success as a lawyer, emphasizing the importance of...
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defense from Adversarial Training Category
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show practical example of defense from...
The Business Professor
Defenses to a Claim of Copyright Infringement
Defenses to a Claim of Copyright Infringement
Financial Times
Charts that Count: how Donald Trump is weaponising growth
FT Alphaville's Brendan Greeley explains how the growth in military spending under the US president has helped to stimulate the economy and boost GDP.
Curated Video
The next global arms race?
America and Russia have pulled out of the INF, a cold war-era weapons treaty. Why is this significant and what does this mean for global stability?
Learning Mole
Insect Ecology
This video will take students through how insects fit into their environments. It explores their habitats and the way they live.
Hip Hughes History
The Sixth Amendment Explained: The Constitution for Dummies Series
The 6th Amendment to the US Constitution and the right to a speedy and public trial by an impartial jury explained.
Curated Video
CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Governance, Management, standards, and frameworks
CISM Domain 1: Information Security Governance: Governance, Management, standards, and frameworks This clip is from the chapter "CISM Domain 1: Information Security Governance" of the series "CISM Certification Domain 1: Information...