Hi, what do you want to do?
TED Talks
TED: The case for a decentralized internet | Tamas Kocsis
Who controls the internet? Increasingly, the answer is large corporations and governments -- a trend that's threatening digital privacy and access to information online, says web developer Tamas Kocsis. In this informative talk, Kocsis...
3Blue1Brown
Linear transformations and matrices: Essence of Linear Algebra - Part 3 of 15
When you think of matrices as transforming space, rather than as grids of numbers, so much of linear algebra starts to make sense.
SciShow
Plants Are Way Cooler Than We Give Them Credit For
Plants! If oxygen and good smells aren't enough for you, here's a collection of episodes that might win you over.
SciShow
How the Web Became a Thing | The History of the Internet, Part 2
In part 2 of our History of the Internet series, Hank explains how public access became declared a human right!
SciShow
How Close Are We to the Perfect Deepfake?
Thanks to deepfakes, CGI can be more realistic and even amateurs can easily create some fun footage. But there are also sinister uses out there.
TED-Ed
TED-Ed: Dead stuff: The secret ingredient in our food chain - John C. Moore
When you picture the lowest levels of the food chain, you might imagine herbivores happily munching on lush, living green plants. But this idyllic image leaves out a huge (and slightly less appetizing) source of nourishment: dead stuff....
TED-Ed
TED-Ed: The secret language of trees - Camille Defrenne and Suzanne Simard
Learn how trees are able to communicate with each other through a vast root system and symbiotic fungi, called mycorrhizae. -- Most of the forest lives in the shadow of the giants that make up the highest canopy. These are the oldest...
TED-Ed
TED-Ed: The infamous and ingenious Ho Chi Minh Trail - Cameron Paterson
The Ho Chi Minh Trail not only connected North and South Vietnam during a brutal war but also aided Vietnamese soldiers. The trail shaved nearly five months of time off of the trip and was used as a secret weapon of sorts. Cameron...
Crash Course
Television Production: Crash Course Film Production
In our final episode of Crash Course Film Production, it's time to take a look at television production and how it differs from feature film production. It's subtle but it has a lot to do with how television shows make money for their...
Crash Course
Network Solids and Carbon: Crash Course Chemistry
In this episode, Hank talks about Network solids and Carbon and how you can actually create a Diamond from plain old Carbon... well, YOU probably can't unless you own a bunch of elephants. It's a long story. BUT, within you will...
TED Talks
TED: It’s our city. Let’s fix it | Alessandra Orofino
Too often, people feel checked out of politics — even at the level of their own city. But urban activist Alessandra Orofino thinks that can change, using a mix of tech and old-fashioned human connection. Sharing examples from her...
SciShow
Bitcoin: How Cryptocurrencies Work
Whether or not it's worth investing in, the math behind Bitcoin is an elegant solution to some complex problems.
TED Talks
TED: 3 ways community creates a healthy life | Olivia Affuso
Maintaining a healthy weight takes more than diet and exercise, says physical activity epidemiologist Olivia Affuso. In this actionable talk, she shows how you can kickstart a healthy life by tapping into the collective power of a...
MinuteEarth
Which Parts Of The Brain Do What?
Our functional map of the brain has changed. Here's why.
Credits (and Twitter
handles):
Script Writer: David Goldenberg
(@dgoldenberg)
Script Editor: E
mily Elert...
Credits (and Twitter
handles):
Script Writer: David Goldenberg
(@dgoldenberg)
Script Editor: E
mily Elert...
Crash Course
The Internet: Crash Course Computer Science
Today, we're going to talk about how the Internet works. Specifically, how that stream of characters you punch into your browser's address bar, like "youtube.com", return this very website. Just to clarify we're talking in a broader...
Crash Course
Computer Networks: Crash Course Computer Science
Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We’re going to begin with computer networks, and how they grew from small groups of connected computers on LAN networks...
Healthcare Triage
Getting In-Network Care is Harder Than You'd Think
In a recent Health Affairs article, the Commonwealth Foundation conducted their periodic survey of eleven countries to see how access issues might have improved or worsened. We've covered these data before. Let's update. This is...
Global Ethics Solutions
Ethical Expectations: Code of Conduct Training | Part 4
Develop ethical decision-making skills in business technology and communication. Learn responsibilities, proper use, and boundaries in Part 4 of this training.
Curated Video
ELROND Coin Review
In this video, we will talk about the Elrond Price Prediction for 2021. We’ll be discussing updates and recent partnerships for the Elrond Network which will undoubtedly influence the growth of the EGLD Coin.
Let’s see what...
Let’s see what...
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - Locking Ports to Hosts with Port Security
In this video, explore how to lock switch ports to specific MAC addresses, further enhancing network security.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - Why we have EtherChannel
In this video, explore the benefits of EtherChannel in increasing bandwidth and providing redundancy in a network.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - Introduction- STP
In this video, we introduce STP, the protocol designed to prevent network loops in Ethernet networks.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - FHRP First Hop Redundancy Protocols
In this video, learn about FHRPs such as HSRP, VRRP, and GLBP, which provide fault tolerance at the first hop in routing.
Curated Video
Cisco CCNA 200-301: The Complete Guide to Getting Certified - Network Redundancy
In this video, explore the importance of network redundancy and how it enhances network reliability.