Hi, what do you want to do?
Institute for New Economic Thinking
How Elite Power Brokers Corrupt our Finances, Freedom, and Security
From the Tea Party to Occupy Wall Street, however divergent their political views, these groups seem united by one thing: outrage over a system of power and influence that only serves the interests of a small number of corrupt...
XKA Digital
Overcoming challenges by having the courage of your convictions
Julian has spent his entire working career working in information technology and turning ideas into software services or businesses at Apple, AT&T Unisource, the UK Government and as the founder of his own Internet software...
Institute for New Economic Thinking
Leanne Ussher and Sorin Solomon - Financial Fragility in a Network of Trade Credit
The physicist Sorin Solomon begins to feel dizzy when the economist Leanne Ussher talks econ lingo. Yet he listens, because the two of them have found a productive area of collaboration: some economic phenomena, they find, can be...
Institute for New Economic Thinking
How Elite Financial Networks Rule the World
The identities of the world’s most powerful people, and the corporations and institutions they run, are well known. What’s poorly understood is a key driving force behind elites’ power: their ability to build, and capitalize on,...
Science360
New cyber-physical system enables drone-carried broadband in disaster zones - Science Nation
Networked UAVs: Arming drones with Wi-Fi to support emergency response
With support from the National Science Foundation, electrical engineer Yan Wan and a team at the University of Texas at Arlington are developing a new...
With support from the National Science Foundation, electrical engineer Yan Wan and a team at the University of Texas at Arlington are developing a new...
NASA
The Invisible Network: 01. Ascension | NASA's The Invisible Network Podcast
Just south of the equator lies a tiny plot of volcanic soil, a thousand miles from the nearest continent. This bizarre, remote island had mammoth importance to America’s first efforts in space.
APMonitor
Introduction to OT Cybersecurity
Cybersecurity is the protection of networks and computer systems, including hardware and software, against cyberattacks. Of particular interest to engineers is the computer control of physical systems that monitor and control...
Curated Video
Create a machine learning model of a real-life process or object : Improving the Network with Better Activation Functions and Dropout
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a...
National Institute of Standards and Technology
Vint Cerf: The past, present and future of the internet
Donna Dodson, Associate Director and Chief Cyber Security Advisor, and Vint Cerf, Chief Internet Evangelist for Google and former NIST VCAT member, have a wide-ranging discussion about the past, present and future of the internet,...
Curated Video
routing protocols : How do routers determine the best route?
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.
Routing Introduction: How do routers determine...
Routing Introduction: How do routers determine...
IDG TECHtalk
Enterprise networking trends in 2021: Preparing for the new normal
A year into the coronavirus pandemic, IT continues to support remote employees. As organizations begin planning to bring workers back into the office, IT must now consider upgrading their networks to best support employees in a...
Curated Video
routing protocols : Static vs. Dynamic Routing
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.<b<br/>r/>
Routing Introduction: Static vs. Dynamic Routing
Routing Introduction: Static vs. Dynamic Routing
Institute for New Economic Thinking
Ian Goldin: The Global Market and Nation States (3/7)
The video shows the panel Sovereignty and Institutional Design in the Global Age at INET's Bretton Woods Conference on April 9, 2011. The speaker in this segment is Ian Goldin, Director of the James Martin 21st Century School-Oxford...
The Wall Street Journal
Are We Winning?
High-profile breaches continue, from DNC and Equifax to Facebook and Under Armour. Malware and ransomware grind businesses to a halt, and vulnerabilities face utilities and other infrastructure. What's the score in the battle over...
TLDR News
Brits are Burning 5G Masts Because of Coronavirus Conspiracies... Sorry What? - TLDR News.
It seems that some people in the UK have started to believe a conspiracy theory that 5G is causing Coronavirus. So in this video, we'll discuss the conspiracy theory, explain why it's wrong and tell you some of the crazy things people...
Institute for New Economic Thinking
Ian Goldin, Sanjeev Goyal, Frank Kelly, J. Doyne Farmer - Networks and Systemic Risks
The Inaugural Conference @ King's, Institute for New Economic Thinking, Session 2 Q&A:<b<br/>r/>
What Kind of Theory to Guide Reform and Restructuring of the Financial and <br/>Non-Financial Sectors?
What Kind of Theory to Guide Reform and Restructuring of the Financial and <br/>Non-Financial Sectors?
XKA Digital
If you articulate a problem, propose a solution
Chris Roberts is a security specialist working as an Associate Director, Security & Justice at TorchlightGroup. TorchlightGroup specialises in the use of niche capabilities and specialist skills to assist governments and commercial...
Curated Video
The Power of Social Media
This video provides an overview of the different ways social media is used and its potential benefits. Social media connects people and enables people to share knowledge and create content efficiently.
Brainwaves Video Anthology
Will Richardson - Personal Learning Networks
Will Richardson is a parent, educator, speaker, author, and blogger. Will is trying to answer the question, "What happens to schools and classrooms and learning in a 2.0 world?"
Curated Video
CISSP®- Business Continuity Planning - Part 1
This is the first part of a two-part video that explains business continuity planning.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the...
Curated Video
routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Exam Question Review
Penetration testing provides insight as to how secure an organization's physical and IT infrastructure really is. In this episode, a pen testing scenario is provided.
r/>
This clip is from the chapter "Testing Infrastructure"...
r/>
This clip is from the chapter "Testing Infrastructure"...
Science360
What do we know about how people recognize faces?
What do we know about how people recognize faces? Catherine Stamoulis, assistant professor of pediatrics at Harvard Medical School, answers the question on this edition of "Ask a Scientist."
Intelligence Squared
Niall Ferguson on Facebook's role in the rise of Donald Trump
Niall Ferguson on Facebook's role in the rise of Donald Trump.