TED Talks
Ray Kurzweil: The accelerating power of technology
Inventor, entrepreneur and visionary Ray Kurzweil explains in abundant, grounded detail why, by the 2020s, we will have reverse-engineered the human brain and nanobots will be operating your consciousness.
TED Talks
Ray Kurzweil: A university for the coming singularity
Ray Kurzweil's latest graphs show that technology's breakneck advances will only accelerate -- recession or not. He unveils his new project, Singularity University, to study oncoming tech and guide it to benefit humanity.
TED Talks
Paul MacCready: Nature vs. humans
In 1998, aircraft designer Paul MacCready looks at a planet on which humans have utterly dominated nature, and talks about what we all can do to preserve nature's balance. His contribution: solar planes, superefficient gliders and the...
TED Talks
TED: How to upgrade democracy for the Internet era | Pia Mancini
Pia Mancini and her colleagues want to upgrade democracy in Argentina and beyond. Through their open-source mobile platform they want to bring citizens inside the legislative process, and run candidates who will listen to what they say.
Curated Video
India Business Outsourcing
New ReviewOutsourcing, the practice of hiring people outside a company to perform services or create goods, has been the driving force of India’s new business world. India is now the world’s largest outsourcing market. The information technology...
Curated Video
Complete Linux Training Course to Get Your Dream IT Job - Facts about IT
New ReviewExplore interesting facts about the IT sector, highlighting the industry's growth, diversity, and impact on the global economy.
Curated Video
Mass Marketing & Other Marketing Strategies Explained
When firms target their customers they need to determine the overall kind of marketing strategy they are going to use. Whether it is a one size fits all model that you see with Mass Marketing, or at a one on one level in...
The Business Professor
Manufacturing Functions - Explained
What are Manufacturing Functions? Functions related to manufacturing operations may include the design and development of production lines, purchasing raw materials and components, selection of raw material suppliers and subcontractors,...
The Business Professor
Management Information Systems Concentration
Management Information Systems Concentration
The Business Professor
Effect of Information Technology on Negotiation
When negotiators interact via technology, power and status differences/cues are minimized. This is known as the weak get strong effect. As such, people respond more openly and are less likely to conform to social norms.
Curated Video
Digitalization of X-ray Imaging: Revolutionizing Healthcare in England
This video highlights the transition from traditional X-ray films to digital imaging and storage in hospitals across England. The nationwide computerized system allows doctors to make diagnoses from screens, eliminating the need to...
Curated Video
Stuxnet
Stuxnet, a powerful cyber weapon used to disrupt Iran's nuclear advancements at the Natanz facility in 2010, marked a pivotal moment in the history of cyber warfare.
Curated Video
South Korea's Innovative Computer Fashion Show: Blending Technology and Fashion for Everyday Life
South Korea's recent computer fashion show showcased wearable technology integrated into clothing for military officers, firefighters, and working mothers. From robotic devices aiding in lifting heavy objects to vests measuring fitness...
Curated Video
The Evolution of Workplace Technology: From Calculators to Handheld Computers
The video explores the evolution of workplace technology, focusing on the impact of the handheld calculator introduced by Texas Instruments. It highlights how this innovation revolutionized office tasks, leading to advancements in...
Curated Video
Ensuring Information Security: Challenges and Preparations for Major Events
The video discusses the importance of information security in the world of technology, highlighting the potential threats from organized crime and individual hackers. It also mentions the massive undertaking of ensuring information...
The Business Professor
Manufacturing Functions - Explained
What are Manufacturing Functions? Functions related to manufacturing operations may include the design and development of production lines, purchasing raw materials and components, selection of raw material suppliers and subcontractors,...
Curated Video
Tomorrow's Energy
Andrew Hoffman, Professor of Sustainable Enterprise at the University of Michigan, gives us a taste of how he thinks the world’s view on energy will change radically over the next 30 years.
Curated Video
History of the Hashtag
Everyday, millions of people around the world use hashtags to sift through the Internet’s endless content – but where did this ubiquitous symbol actually come from?
Curated Video
Introduction to IT and Cybersecurity: Basics, Protocols, and Future Trends
Part 1/16 of Introduction to IT and Cybersecurity series: The video is an introduction to the course "Introduction to IT and Cybersecurity." The course covers topics such as IT hardware and software, networking, servers, databases,...
Curated Video
Introduction to IT and Cybersecurity: Functional Areas of IT Operations
Part 6/16 of Introduction to IT and Cybersecurity series: The video discusses the various functional areas of an IT department, starting with the basic organizational chart that includes positions such as IT manager, CTO/CIO, application...
Curated Video
Introduction to IT and Cybersecurity: Essentials of Networking
Part 2/16 of Introduction to IT and Cybersecurity series: This video is an introductory lesson on networking essentials. The presenter first defines various communication terminologies used in networking, and explains devices such as...
Curated Video
Introduction to IT and Cybersecurity: Web Infrastructure
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...
Curated Video
Introduction to IT and Cybersecurity: Servers Essentials
Part 3/16 of Introduction to IT and Cybersecurity series: This video discusses the concept of client-server and its importance in distributed application structures. Examples of client-server settings are LAN networks where a central...
Curated Video
Introduction to IT and Cybersecurity: Software Licensing
Part 9/16 of Introduction to IT and Cybersecurity series: This video discusses software licensing and the different schemes applied in on-premise and on-cloud environments. It also outlines the types of licenses available, including...