Instructional Video5:14
SciShow

How Fake Internet Accounts Divide Us and How to Stop Yourself From Falling for Them

12th - Higher Ed
The people behind fake posts can rely on a few tricks to get you on board. But there are ways to spot them, and ways to avoid falling for what they have to say.
Instructional Video6:18
Amoeba Sisters

Dichotomous Keys: Identification Achievement Unlocked

12th - Higher Ed
Join the Amoeba Sisters in discovering how to use a dichotomous key to identify organisms. This video also touches on the importance of scientific names. Table of Contents: Intro 00:00 What is a Dichotomous Key? 0:29 Scientific Names vs....
Instructional Video10:05
TED Talks

TED: Your fingerprints reveal more than you think | Simona Francese

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. Our fingerprints are what make us unique -- but they're also home to a world of information hidden in molecules...
Instructional Video3:34
Curated Video

Risk Management for Cyber Security Managers - Risk Management Processes

Higher Ed
In this lesson, we will discuss the general cyber risk management cycle.
Instructional Video0:46
Curated Video

Asteroid - Rocky Objects in Space

6th - 12th
Objects composed of rocky or metallic materials, mainly found orbiting the Sun in a region called the asteroid belt between Mars and Jupiter. A Twig Science Glossary Film. Key scientific terms defined in just 60 seconds using stunning...
Instructional Video3:14
Curated Video

Star-nosed mole

K - 5th
Discover the most unusual nose in the animal kingdom! Life processes - Humans and other animals - Humans' and other animals' needs Learning Points The star-nosed mole uses its unusual nose to feel for prey. A Twig Context Film. Reinforce...
Instructional Video6:42
Two Minute Music Theory

The ART of Music Theory

12th - Higher Ed
Music theory is often confused as being mostly about identification, but really - it's more about interpretation. Music Theory is an art. And it's an artform that is both valuable and practical for all musicians throughout their lifetime.
Instructional Video2:48
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention

Higher Ed
This video explains how to prevent identification and authentication failures.
Instructional Video9:41
Curated Video

CISSP Crash Course - Managed Identification

Higher Ed
This video explains managed identification and authentication. This clip is from the chapter "Identity and Access Management" of the series "CISSP Crash Course".This section covers domain 5, which focuses on identity and access management.
Instructional Video3:37
Curated Video

Design Microservices Architecture with Patterns and Principles - Identify Bounded Context Boundaries for Each Microservices

Higher Ed
In this video, you will learn practical techniques and strategies to identify Bounded Context boundaries for each microservice in your architecture. We will understand the importance of isolating domains and ensuring that each...
Instructional Video4:18
Curated Video

The Reveal Show: Minerals

3rd - 8th
Dr. Forrester identifies five minerals.
Instructional Video2:34
Curated Video

Enhancing Battlefield Identification: NATO's Advanced Technology Integration

Pre-K - Higher Ed
The video showcases a multinational NATO exercise on Salisbury Plain, focusing on advanced technologies for combat identification to prevent friendly fire incidents. Troops from 9 countries are testing various systems, from encrypted...
Instructional Video2:29
Curated Video

Smartwater: The Innovative Solution to Combat Burglary and Theft in London

Pre-K - Higher Ed
The video highlights the innovative use of Smartwater technology as a powerful deterrent against burglaries in London's Oxford Street area. By tagging thieves with a unique forensic signature, Smartwater helps law enforcement identify...
Instructional Video2:16
The Business Professor

DUNS Number - Explained

Higher Ed
What is a DUNS Number? The Data Universal Numbering System, abbreviated as DUNS or D-U-N-S, is a proprietary system developed and managed by Dun & Bradstreet that assigns a unique numeric identifier, referred to as a "DUNS number" to a...
Instructional Video3:07
Curated Video

Self-Identification Through Language

12th - Higher Ed
David Bellos, Director of the Program in Translation and Intercultural Communication at Princeton University, argues that speech serves a strong sociological function as a form of self-indentification.
Instructional Video2:19
Curated Video

Judaism and Identity

12th - Higher Ed
David Goldberg, Former Senior Rabbi Emeritus of London’s Liberal Jewish Synagogue tackles the thorny question, Who is a Jew?
Instructional Video7:04
Curated Video

This Smart Toilet Uses Butt Recognition To Know Who You Are

Higher Ed
It's a smart toilet that takes a video of your butt and uses it to identify you. Yep. mons.wikimedia.org/w/index...
Instructional Video5:31
Curated Video

Your Identity Is NOT Private

Higher Ed
AI can be used to re-identify individuals based on videos, images, and now anonymized data. What can you do to protect yourself, and what is the future of this technology?
Instructional Video6:30
Curated Video

Risk Management Implementation Requirements

Higher Ed
The video shows how to Identify the risk, Assess the risk,Treat the risk,Monitor and Report on the risk
Instructional Video1:18
Curated Video

Definitions

Higher Ed
The video introduces various terminology used in risk management
Instructional Video11:02
National Institute of Standards and Technology

Key to Security: Biometric Standards

9th - 12th
NIST develops and tests biometrics (e.g., fingerprint, face, iris, & multimodal) standards and technology that promote security, interoperability, and innovation. Four projects (in collaboration with the DHS and the FBI) are highlighted:...
Instructional Video5:32
Curated Video

Detection and Identification of Plant Diseases

Higher Ed
In this lecture video, the speaker discusses the detection and identification of plant diseases. They explain how to detect signs of diseases in plants, such as stunted growth, spots on leaves, and discoloration, and how to identify...
Instructional Video5:19
Science360

Biometrics - Science of Innovation

12th - Higher Ed
A method for capturing and analyzing the vein patterns in the white part of the eye to help identify people. Biometrics has potential applications for driver's licenses, passports or computer identification control. Provided by the...
Instructional Video3:17
Science360

Computer scientist sees new possibilities for ocular biometrics

12th - Higher Ed
While many of us rely on passwords to protect our identity, there's more sophisticated identity recognition technology called biometrics that we could use. Security measures that use biometrics rely on a person's unique characteristics...