Hi, what do you want to do?
Curated Video
Evolution of Mobile Phones: From Wireless Telephones to Lifestyle Devices
The video explores the evolution of mobile phone technology, from the earliest wireless telephone invented by Nathan Stubblefield in 1902 to modern advancements like biometric security features and fitness tracking capabilities. It...
Curated Video
Exploring the Diverse Applications of Fingerprint Technology in Modern Society
This video discusses the expanding use of fingerprint technology beyond law enforcement, including in payment systems at German supermarkets and on college campuses in the US. Additionally, it explores how fingerprint scanning is being...
Curated Video
Revolutionizing Identification: The Future of Iris Recognition Technology
Researchers at Bath University have created a groundbreaking iris recognition algorithm that boasts 100% accuracy in identifying individuals from eye scans. Unlike fingerprint recognition, iris scanning offers more reliable...
Curated Video
Revolutionizing Education: The Implementation of Biometric Roll Call Systems in Schools
Saint Andrew's School near Dublin has implemented a biometric roll call system using PIN codes and finger scans to track student attendance. Parents are notified via text message if their child is absent, allowing them to take...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Android Security Tweaks
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks.
<
br/>
This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to...
<
br/>
This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to...
Packt
Android Security Tweaks
This video talks about a few more settings that you might need to tweak to keep your Android device safe from attacks. This clip is from the chapter "Mobile Security Apps" of the series "The Absolute Beginners 2023 Guide to Cybersecurity...
Debunked
6 Myths Debunked About The Human Body
Just how unique are your fingerprints? Appendix’s purpose? Why aren’t we totally human? How do we really taste things?
Curated Video
The Future of Airport Security | AI + Biometrics
Airport security is moving away from boarding passes and towards facial recognition. What does this mean for you?
Curated Video
Do Deepfakes Have Fingerprints? | Deepfake Detection + GAN Fingerprints
Deepfake detection is hard, but it turns out they might have fingerprints that we can use to separate them from real video!
Curated Video
How to Roll Fingerprints
“How to Roll Fingerprints” will demonstrate to students the correct way to roll fingerprints.
Let's Tute
Why Fingerprints are Unique and Important
This video explains the science behind fingerprints and why they are so unique and important in criminal investigations. It also explores how technology is using fingerprints for security purposes and how each person's fingerprint...
National Institute of Standards and Technology
Key to Security: Biometric Standards
NIST develops and tests biometrics (e.g., fingerprint, face, iris, & multimodal) standards and technology that promote security, interoperability, and innovation. Four projects (in collaboration with the DHS and the FBI) are...
Science360
Biometrics - Science of Innovation
A method for capturing and analyzing the vein patterns in the white part of the eye to help identify people. Biometrics has potential applications for driver's licenses, passports or computer identification control.
Provided...
Provided...
Science360
Uncertainties - How Do We Know?
How much warming do we face, and what are the uncertainties involved?
National Institute of Standards and Technology
No Strings Attached: NIST Protocol Helps Communicate Biometrics from Anywhere
NIST computer scientist Matt Aronoff describes the NIST Biometrics Web Services project, a new protocol that allows any device that can communicate with the Web to accept data from any biometrics sensors (such as fingerprint scanners,...
Curated Video
5G and Wireless Communication for Beginners - Picking up the Right Call Recipient
This video demonstrates how the antenna discriminates between the intended recipient and other recipient who are covered in the range of antenna.
r/>
This clip is from the chapter "Introduction – 1G is Where All of it Began" of...
r/>
This clip is from the chapter "Introduction – 1G is Where All of it Began" of...
Programming Electronics Academy
EPS 4: Fingerprint Readers and Remote Igniters with Noah Del Coro
This week Michael sits down with engineering student Noah Del Coro to talk about a couple of interesting projects that he’s been able to build using Arduino.
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - IAAA - Part 1- Identification, Authentication, Authorization, and Accountability
This is the first part of a two-part video that explains the concept of IAAA.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Browser Security Part I
In part 1 of this video series, you will be presented with the main security issues when it comes to using the major browsers in the market today. You will learn about invasive and dangerous things such as browser scripts, trackers,...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - 2-Factor Authentication Part I
In this 2-part eye-opening video module, you will learn all about wonderful 2-factor authentication: an excellent solution for preventing hackers hijacking your account! The term ‘2FA’ will be explained in simple terms, and then...
Curated Video
Python for Machine Learning - The Complete Beginners Course - Introduction to Classification
In this video, we will have a quick introduction to classification.
<
br/>
This clip is from the chapter "Classification Algorithms: K-Nearest Neighbors" of the series "Python for Machine Learning - The Complete Beginner's...
<
br/>
This clip is from the chapter "Classification Algorithms: K-Nearest Neighbors" of the series "Python for Machine Learning - The Complete Beginner's...
Curated Video
The Complete Practical Docker Guide - Connecting to the Linux Server Remotely Via SSH
This video explains connecting to the Linux server remotely via SSH.<br/<br/>>
This clip is from the chapter "Networking in Linux" of the series "The Complete Practical Docker Guide".This section focuses on networking in Linux.
This clip is from the chapter "Networking in Linux" of the series "The Complete Practical Docker Guide".This section focuses on networking in Linux.
Learning Mole
Mystery of The Steolen Sandwich
This Lucas Detective video lesson is the Mystery of the Stolen Sandwich.Students will enjoy joining Lucas in this animated video as they discover STEM subjects and work to unveil the mystery.