Instructional Video7:00
Curated Video

Unpacking the Wordpress/WP Engine Fued

12th - Higher Ed
Automattic CEO Matt Mullenweg recently started a crusade against WP Engine, a profit-driven company based on WordPress’s open source platform, which has evolved into a lawsuit that could blow a hole in the internet. Find out why...
Instructional Video3:54
Curated Video

Use-After-Free Vulnerabilities in Firefox and Tor

12th - Higher Ed
Firefox was recently hit by CVE-2024-9680, a critical level use-after-free vulnerability, also impacting browsers like Tor and Zen . Learn how use-after-free exploits can have a major impact in real-world code. Topics Covered: How did...
Instructional Video2:31
Curated Video

Appwrite in 100 Seconds

12th - Higher Ed
Learn the basics of Appwrite, an open-source platform for building applications at any scale, using your preferred programming languages and tools. Topics Covered: Intro to Appwrite How to self-host with Appwrite How to use Appwrite to...
Instructional Video4:28
Curated Video

Linux Mistake Exposes a Terabyte of Secret Pokémon Data

12th - Higher Ed
Game Freak, the developer behind your favorite Pokémon games, got hacked. A terabyte of data was leaked on internet, including employee data, source code for past games and the code name for Nintendo Switch 2. Let's fiind out what it...
Instructional Video4:19
Curated Video

JavaScript Framework Reinvention and "Runes" in Svelte

12th - Higher Ed
Svelte 5 was released this week with a new developer experience via a feature called "Runes". Learn the basics of Svelte Runes compare them to other JavaScript frameworks like React.js, Vue, Angular, and more. Topics Covered: Svelte 5...
Instructional Video6:04
Curated Video

Microsoft Notepad.exe and Other Major Updates for Devs

12th - Higher Ed
Let's take a look at 13 major updates to developer tools and frameworks that you missed recently. Like the Microsoft Notepad's new AI integration, GitHub Copilot's multi-model support, changes in Next.js 15, and more! Topics Covered: AI...
Instructional Video4:25
Curated Video

SQLite and “libSQL”

12th - Higher Ed
Take a first look at a SQLite fork growing in popularity called libSQL, which makes it possible to launch one database per user. Let's dive into the history of SQLite and examine the tradeoffs of database scaling techniques. Topics...
Instructional Video6:10
Curated Video

How to Break the Technical Interview

12th - Higher Ed
With the rise of remote work and AI, the tech world has also seen a rise in cheating on the software engineering technical interview. Let's look into modern techniques people use to cheat during coding interviews and the consequences of...
Instructional Video4:45
Curated Video

D-Link Vulnerabilities and Planned Obsolescence

12th - Higher Ed
D-Link networking hardware has been hit buy multiple serious vulnerabilities over the past few weeks. Let's take a look at these exploits and how to study them with ethical hacking and penetration testing. Topics Covered: Overview of...
Instructional Video5:11
Curated Video

"Ghost" Programmers and the Influence of AI in Tech

12th - Higher Ed
A recent study from Stanford University claims that 9.5% of programmers are ghosts who do almost zero work. Let's also look at other recent developments in AI, like the Sora API leak, Microsoft Recall, and more. Topics Covered: Trends...
Instructional Video3:46
Instructional Video3:17
Science ABC

OAuth Explained

Pre-K - Higher Ed
OAuth is a protocol that helps big websites (websites that have a very large number of users, such as Google, Facebook, etc.) grant access to its users information to third-party websites or applications without sharing the users...
Instructional Video5:14
Science ABC

Methusaleh: The oldest tree in the world | What's the mystery of trees' immortality?

Pre-K - Higher Ed
No one can beat trees at living long. Methusaleh, the single oldest living tree, that we've discovered, is over 4,800 years old. On the other hand, Pando is a colony of quaking aspen trees all born from the same over 70,000 year old root...
Instructional Video3:27
Science ABC

How Are Computer Games ‘Cracked’?

Pre-K - Higher Ed
Game cracking involves bypassing security checks implemented by gaming companies. Hackers use tools such as kernel-mode debuggers, disassemblers, and hex-editors, which allow manipulation of the game's code. In this video, we will...
Instructional Video3:59
Curated Video

Civil Law vs. Common Law: Understanding Legal Systems

Higher Ed
This video explains the differences between civil law and common law legal systems. It uses a relatable scenario to illustrate how judges in each system evaluate cases and make decisions.
Instructional Video3:11
Science ABC

What’s a QR Code And How Is It Different From A Barcode?

Pre-K - Higher Ed
While a barcode only holds information in the horizontal direction, a QR code does hold information in both horizontal and vertical directions. Due to this, a QR code holds hundreds of times more information than a barcode.
Instructional Video2:39
Great Big Story

Betelhem Dessie, empowering Ethiopia’s next generation of tech leaders

12th - Higher Ed
Betelhem Dessie, a pioneering Ethiopian tech entrepreneur, is inspiring young girls and innovators by creating tech education programs and developing software that addresses local challenges.
Instructional Video6:19
Great Big Story

The mystery of Kryptos, a CIA puzzle unsolved for decades

12th - Higher Ed
Dive into the enigma of Kryptos, a CIA sculpture hiding an unsolved code, and meet Elonka Dunin, a dedicated cryptanalyst working to crack it.
Instructional Video8:43
Curated Video

Cell nucleus: structure and function

9th - Higher Ed
The nucleus is one of the most important organelles found in eukaryotic cells. In this video, we will cover the definition, structure and functions of the cell nucleus.
Instructional Video3:15
Curated Video

Binary: The Alien Language

6th - 12th
In the 1970s, launched aboard a space probe was what is considered one of the most important scientific diagrams ever created. If found by extraterrestrial life, the plaque explains details about the human race and where we are in the...
Instructional Video3:14
Curated Video

The Prime Number Code

6th - 12th
Why prime numbers are the building blocks of encryption, used for information security, in cash machines and to hide your identity online. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum....
Instructional Video3:07
Curated Video

Binary: What Is Binary?

6th - 12th
Learn how the binary base system works, and how to symbolise any number using just two digits. Maths - Number A Twig Math Film. Reinforce and extend the learning required by the curriculum. Twig’s context films show abstract concepts in...
Instructional Video3:30
Curated Video

Enigma: Cracking The Code

6th - 12th
The Enigma machine could pair up letters in 150 million million ways. How did the machine work to give so many different permutations – and how was the code eventually cracked? Maths - Number A Twig Math Film. Reinforce and extend the...
Instructional Video3:28
Curated Video

Algorithms: Turing

6th - 12th
Why Turing devoted his life to the quest of what we now know as artificial intelligence, and invented the first algorithms that now form the basis of all programmed computers. Maths - History Of Maths A Twig Math Film. Reinforce and...