Instructional Video7:43
PBS

Can You Judge a Book By Its Cover?

12th - Higher Ed
Get to know the story behind some of literature's most iconic book covers in the latest episode of It's Lit!
Instructional Video10:38
National Institute of Standards and Technology

Remarks of Cita Furlani - Information Technology Lab Director, NIST

9th - 12th
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workshop II November 4-5, 2010 to update government and industry stakeholders on developing cloud computing standards. Cita Furlani,...
Instructional Video3:24
PBS

How Much Energy Does the Internet Use?

12th - Higher Ed
About half the world has internet access. That's 3.6 billion people surfing the web. How much energy is that using? And what is our online world doing to our planet's climate?
Instructional Video15:38
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 9

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video11:36
Curated Video

Using Multimedia to Enhance Writing Clarity and Comprehension

K - 5th
In this video, the teacher explains how adding multimedia to writing can make it clearer and more engaging. The teacher gives examples of how to select and incorporate different types of media, such as photos and videos, to help readers...
Instructional Video9:24
Hip Hughes History

The Slaughterhouse Cases: Interpreting the 14th Amendment

6th - 12th
An examination of the 14th amendment through the 1873 Slaughterhouse Cases. Perfect for APGOV students, pre-law students and life long learners.
Instructional Video9:15
Learn French With Alexa

GCSE French Speaking: Dangers of the Internet?

9th - 12th
In this video we look at this statement: Quels sont les dangers du Net? - What dare the dangers of the Internet? (AQA Theme 1 - Identity and culture, Topic 2 - Technology in everyday life):
Instructional Video11:25
National Institute of Standards and Technology

Keynote Remarks of Vivek Kundra - U.S. Chief Information Officer

9th - 12th
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workship II November 4-5, 2010 to update government and industry stakeholders on developing cloud standards. Federal CIO Vivek Kundra...
Instructional Video4:21
Mediacorp

Countering Fake News in Indonesia

12th - Higher Ed
In this video, Ridwan Kamil, a politician in Indonesia, faces the challenge of combating fake news and negative campaigns on social media. With the help of a dedicated team, they monitor and respond to comments, create counter memes, and...
Instructional Video5:42
Curated Video

Explain web security : Basic Terminologies

Higher Ed
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Instructional Video7:39
Physics Girl

Quantum Cryptography Explained

9th - 12th
With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and...
Instructional Video5:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems

Higher Ed
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO). This clip is...
Instructional Video4:13
Institute for New Economic Thinking

Government as the Solution, not the Problem

Higher Ed
In part 1 of INET's interview with Fred Block, he says that government investment in innovation is essential: in fact, even during the era of Ronald Reagan, the US government played a key role in developing new technologies and the Internet
Instructional Video4:14
Brainwaves Video Anthology

Jackie Gerstein - Moving Education from 1.0 to 3.0

Higher Ed
Dr. Jackie Gerstein's byline is, "I don't do teaching for a living. I live teaching as my doing . . . and technology has amplified my passion for doing so." Gerstein has been teaching in-person and online for several decades. Currently...
Instructional Video7:17
Religion for Breakfast

Is Jediism a Religion?

12th - Higher Ed
Jediism came to prominence in 2001 during the UK census when a bunch of people claimed to be "Jedi" as their religion. But there also is a real-world movement of people calling themselves Jediists, followers of Jediism. How should...
Instructional Video3:15
Brainwaves Video Anthology

Juan Parada - Learning from Failure

Higher Ed
Juan M. Parada, is a technologist, media critic, web developer, consultant, digital strategist, DJ, business owner, and Associate Professor at the University of the Arts in Philadelphia, PA. Mr. Parada has been a part of the Interactive...
Instructional Video2:21
XKA Digital

Strive to make your own products redundant

Higher Ed
Julian has spent his entire working career working in information technology and turning ideas into software services or businesses at Apple, AT&T Unisource, the UK Government and as the founder of his own Internet software companies....
Instructional Video2:22
Mediacorp

Uncovering the Dark Side of Misinformation in Indonesia

12th - Higher Ed
This video highlights the consequences of fake news in Indonesia, where it has led to violence, conflicts, and the spread of hate speech. The video also showcases the role of tech idealists in using technology for good and promoting...
Instructional Video11:52
Curated Video

Describe network protocols : Network Layers

Higher Ed
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will have a look at Network Layers and learn something about...
Instructional Video4:13
Mediacorp

The Rise of Social Media Preachers in Indonesia

12th - Higher Ed
This video explores the phenomenon of social media influencers in Indonesia, specifically focusing on religious preachers like Felix Sierra who have gained millions of followers online. It examines the impact of these influencers on the...
Instructional Video21:27
The Wall Street Journal

Kimberly Bryant and Jessica Rosenworcel on The Digital Divide

Higher Ed
At WSJ Tech Live, Kimberly Bryant and Jessica Rosenworcel discuss how the government and privacy sector should work to bridge the digital divide.
Instructional Video10:53
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Connecting to Dedicated and Mobile Systems

Higher Ed
There are many modern wireless communication standards. This episode discussed the Global Positioning System (GPS), 4G and 5G cellular, Wi-Fi Direct, and mobile device tethering. This clip is from the chapter "Securing Dedicated Systems"...
Instructional Video10:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud

Higher Ed
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
Instructional Video17:30
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy-Segment 2

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....