Instructional Video8:05
TED Talks

TED: A highly scientific taxonomy of haters | Negin Farsad

12th - Higher Ed
TeD Fellow Negin Farsad weaves comedy and social commentary to cleverly undercut stereotypes of her culture. In this uproarious talk/stand-up hybrid, Farsad speaks on her documentary, The Muslims Are Coming!, narrates her fight with the...
Instructional Video25:29
TED Talks

TED: How to connect while apart | Eric Yuan

12th - Higher Ed
People everywhere are using Zoom to work, take classes, do yoga -- and even get married. The company's CEO and founder Eric Yuan reflects on how they developed the world's most popular video chat software and envisions a digital future...
Instructional Video9:28
TED Talks

TED: Governments don't understand cyber warfare. We need hackers | Rodrigo Bijou

12th - Higher Ed
The Internet has transformed the front lines of war, and it's leaving governments behind. As security analyst Rodrigo Bijou shows, modern conflict is being waged online between non-state groups, activists and private corporations, and...
Instructional Video9:20
TED Talks

Guy-Philippe Goldstein: How cyberattacks threaten real-world peace

12th - Higher Ed
Nations can now attack other nations with cyber weapons: silent strikes on another country's computer systems, power grids, dams that leave no trace behind. (Think of the Stuxnet worm.) Guy-Philippe Goldstein shows how cyberattacks can...
Instructional Video18:32
TED Talks

Misha Glenny: Hire the hackers!

12th - Higher Ed
Despite multibillion-dollar investments in cybersecurity, one of its root problems has been largely ignored: who are the people who write malicious code? Underworld investigator Misha Glenny profiles several convicted coders from around...
Instructional Video16:31
TED Talks

TED: New rules for rebuilding a broken nation | Paul Collier

12th - Higher Ed
Long conflict can wreck a country, leaving behind poverty and chaos. But what's the right way to help war-torn countries rebuild? At TED@State, Paul Collier explains the problems with current post-conflict aid plans, and suggests 3 ideas...
Instructional Video14:25
TED Talks

TED: How the US government spies on people who protest -- including you | Jennifer Granick

12th - Higher Ed
What's stopping the American government from recording your phone calls, reading your emails and monitoring your location? Very little, says surveillance and cybersecurity counsel Jennifer Granick. The government collects all kinds of...
Instructional Video10:25
TED Talks

TED: How Syria's architecture laid the foundation for brutal war | Marwa Al-Sabouni

12th - Higher Ed
What caused the war in Syria? Oppression, drought and religious differences all played key roles, but Marwa Al-Sabouni suggests another reason: architecture. Speaking to us over the Internet from Homs, where for the last six years she...
Instructional Video8:34
TED Talks

TED: What everyday citizens can do to claim power on the internet | Fadi Chehade and Bryn Freedman

12th - Higher Ed
Technology architect Fadi Chehade helped set up the infrastructure that makes the internet work -- essential things like the domain name system and IP address standards. Today he's focused on finding ways for society to benefit from...
Instructional Video5:38
TED Talks

TED: The surprising way groups like ISIS stay in power | Benedetta Berti

12th - Higher Ed
ISIS, Hezbollah, Hamas. These three very different groups are known for violence — but that’s only a portion of what they do, says policy analyst Benedetta Berti. They also attempt to win over populations with social work: setting up...
Instructional Video25:29
TED Talks

TED: How women will lead us to freedom, justice and peace | H.E. Ellen Johnson Sirleaf

12th - Higher Ed
I was the first woman president of an African nation, and I do believe more countries ought to try that, says H.E. Ellen Johnson Sirleaf, Nobel laureate and former president of Liberia. Telling the story of how Liberian women helped...
Instructional Video16:53
TED Talks

Avi Rubin: All your devices can be hacked

12th - Higher Ed
Could someone hack your pacemaker? Avi Rubin shows how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
Instructional Video11:57
TED Talks

TED: We can fight terror without sacrificing our rights | Rebecca MacKinnon

12th - Higher Ed
Can we fight terror without destroying democracy? Internet freedom activist Rebecca MacKinnon thinks that we'll lose the battle against extremism and demagoguery if we censor the internet and press. In this critical talk, she calls for a...
Instructional Video10:15
SciShow

5 Devastating Security Flaws You've Never Heard Of

12th - Higher Ed
Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
Instructional Video6:01
SciShow

How Meltdown and Spectre Make Your Computer Vulnerable

12th - Higher Ed
Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution.
Instructional Video12:12
TED Talks

TED: How tech companies deceive you into giving up your data and privacy | Finn Lutzow-Holm Myrstad

12th - Higher Ed
Have you ever actually read the terms and conditions for the apps you use? Finn Lutzow-Holm Myrstad and his team at the Norwegian Consumer Council have, and it took them nearly a day and a half to read the terms of all the apps on an...
Instructional Video20:17
TED Talks

TED: Can a divided America heal? | Jonathan Haidt

12th - Higher Ed
* Viewer discretion advised. This video includes discussion of mature topics and may be inappropriate for some audiences. How can the US recover after the negative, partisan presidential election of 2016? Social psychologist Jonathan...
Instructional Video5:06
3Blue1Brown

How secure is 256 bit security?

12th - Higher Ed
When a piece of cryptography is described as having "256-bit security", what exactly does that mean? Just how big is the number 2^256?
Instructional Video14:50
TED Talks

TED: The inside story of the Paris climate agreement | Christiana Figueres

12th - Higher Ed
What would you do if your job was to save the planet? When Christiana Figueres was tapped by the uN to lead the Paris climate conference (COP 21) in December 2015, she reacted the way many people would: she thought it would be impossible...
Instructional Video18:38
TED Talks

TED: The refugee crisis is a test of our character | David Miliband

12th - Higher Ed
Sixty-five million people were displaced from their homes by conflict and disaster in 2016. It's not just a crisis; it's a test of who we are and what we stand for, says David Miliband -- and each of us has a personal responsibility to...
Instructional Video18:09
TED Talks

TED: Our refugee system is failing. Here's how we can fix it | Alexander Betts

12th - Higher Ed
A million refugees arrived in europe this year, says Alexander Betts, and "our response, frankly, has been pathetic." Betts studies forced migration, the impossible choice for families between the camps, urban poverty and dangerous...
Instructional Video12:09
TED Talks

Shyam Sankar: The rise of human-computer cooperation

12th - Higher Ed
Brute computing force alone can't solve the world's problems. Data mining innovator Shyam Sankar explains why solving big problems (like catching terrorists or identifying huge hidden trends) is not a question of finding the right...
Instructional Video7:47
TED Talks

TED: Did the global response to 9/11 make us safer? | Benedetta Berti

12th - Higher Ed
If we want sustainable, long-term security to be the norm in the world, it's time to radically rethink how we can achieve it, says TED Fellow and conflict researcher Benedetta Berti. In an eye-opening talk, Berti explains how building a...
Instructional Video12:09
TED Talks

Andy Yen: Think your email's private? Think again

12th - Higher Ed
Sending an email message is like sending a postcard, says scientist Andy Yen in this thought-provoking talk: Anyone can read it. Yet encryption, the technology that protects the privacy of email communication, does exist. It's just that...