SciShow
How Fake Internet Accounts Divide Us and How to Stop Yourself From Falling for Them
The people behind fake posts can rely on a few tricks to get you on board. But there are ways to spot them, and ways to avoid falling for what they have to say.
Amoeba Sisters
Dichotomous Keys: Identification Achievement Unlocked
Join the Amoeba Sisters in discovering how to use a dichotomous key to identify organisms. This video also touches on the importance of scientific names. Table of Contents: Intro 00:00 What is a Dichotomous Key? 0:29 Scientific Names vs....
TED Talks
TED: Your fingerprints reveal more than you think | Simona Francese
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. Our fingerprints are what make us unique -- but they're also home to a world of information hidden in molecules...
Curated Video
Risk Management for Cyber Security Managers - Risk Management Processes
In this lesson, we will discuss the general cyber risk management cycle.
Curated Video
Asteroid - Rocky Objects in Space
Objects composed of rocky or metallic materials, mainly found orbiting the Sun in a region called the asteroid belt between Mars and Jupiter. A Twig Science Glossary Film. Key scientific terms defined in just 60 seconds using stunning...
Curated Video
Star-nosed mole
Discover the most unusual nose in the animal kingdom! Life processes - Humans and other animals - Humans' and other animals' needs Learning Points The star-nosed mole uses its unusual nose to feel for prey. A Twig Context Film. Reinforce...
Two Minute Music Theory
The ART of Music Theory
Music theory is often confused as being mostly about identification, but really - it's more about interpretation. Music Theory is an art. And it's an artform that is both valuable and practical for all musicians throughout their lifetime.
Curated Video
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention
This video explains how to prevent identification and authentication failures.
Curated Video
CISSP Crash Course - Managed Identification
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Curated Video
Design Microservices Architecture with Patterns and Principles - Identify Bounded Context Boundaries for Each Microservices
In this video, you will learn practical techniques and strategies to identify Bounded Context boundaries for each microservice in your architecture. We will understand the importance of isolating domains and ensuring that each...
Curated Video
Enhancing Battlefield Identification: NATO's Advanced Technology Integration
The video showcases a multinational NATO exercise on Salisbury Plain, focusing on advanced technologies for combat identification to prevent friendly fire incidents. Troops from 9 countries are testing various systems, from encrypted...
Curated Video
Smartwater: The Innovative Solution to Combat Burglary and Theft in London
The video highlights the innovative use of Smartwater technology as a powerful deterrent against burglaries in London's Oxford Street area. By tagging thieves with a unique forensic signature, Smartwater helps law enforcement identify...
The Business Professor
DUNS Number - Explained
What is a DUNS Number? The Data Universal Numbering System, abbreviated as DUNS or D-U-N-S, is a proprietary system developed and managed by Dun & Bradstreet that assigns a unique numeric identifier, referred to as a "DUNS number" to a...
Curated Video
Self-Identification Through Language
David Bellos, Director of the Program in Translation and Intercultural Communication at Princeton University, argues that speech serves a strong sociological function as a form of self-indentification.
Curated Video
Judaism and Identity
David Goldberg, Former Senior Rabbi Emeritus of London’s Liberal Jewish Synagogue tackles the thorny question, Who is a Jew?
Curated Video
This Smart Toilet Uses Butt Recognition To Know Who You Are
It's a smart toilet that takes a video of your butt and uses it to identify you. Yep. mons.wikimedia.org/w/index...
Curated Video
Your Identity Is NOT Private
AI can be used to re-identify individuals based on videos, images, and now anonymized data. What can you do to protect yourself, and what is the future of this technology?
Curated Video
Risk Management Implementation Requirements
The video shows how to Identify the risk, Assess the risk,Treat the risk,Monitor and Report on the risk
National Institute of Standards and Technology
Key to Security: Biometric Standards
NIST develops and tests biometrics (e.g., fingerprint, face, iris, & multimodal) standards and technology that promote security, interoperability, and innovation. Four projects (in collaboration with the DHS and the FBI) are highlighted:...
Curated Video
Detection and Identification of Plant Diseases
In this lecture video, the speaker discusses the detection and identification of plant diseases. They explain how to detect signs of diseases in plants, such as stunted growth, spots on leaves, and discoloration, and how to identify...
Science360
Biometrics - Science of Innovation
A method for capturing and analyzing the vein patterns in the white part of the eye to help identify people. Biometrics has potential applications for driver's licenses, passports or computer identification control. Provided by the...
Science360
Computer scientist sees new possibilities for ocular biometrics
While many of us rely on passwords to protect our identity, there's more sophisticated identity recognition technology called biometrics that we could use. Security measures that use biometrics rely on a person's unique characteristics...