Hi, what do you want to do?
PBS
Can You Judge a Book By Its Cover?
Get to know the story behind some of literature's most iconic book covers in the latest episode of It's Lit!
National Institute of Standards and Technology
Remarks of Cita Furlani - Information Technology Lab Director, NIST
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workshop II November 4-5, 2010 to update government and industry stakeholders on developing cloud computing standards. Cita Furlani,...
PBS
How Much Energy Does the Internet Use?
About half the world has internet access. That's 3.6 billion people surfing the web. How much energy is that using? And what is our online world doing to our planet's climate?
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 9
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Curated Video
Using Multimedia to Enhance Writing Clarity and Comprehension
In this video, the teacher explains how adding multimedia to writing can make it clearer and more engaging. The teacher gives examples of how to select and incorporate different types of media, such as photos and videos, to help readers...
Hip Hughes History
The Slaughterhouse Cases: Interpreting the 14th Amendment
An examination of the 14th amendment through the 1873 Slaughterhouse Cases. Perfect for APGOV students, pre-law students and life long learners.
Learn French With Alexa
GCSE French Speaking: Dangers of the Internet?
In this video we look at this statement: Quels sont les dangers du Net? - What dare the dangers of the Internet? (AQA Theme 1 - Identity and culture, Topic 2 - Technology in everyday life):
National Institute of Standards and Technology
Keynote Remarks of Vivek Kundra - U.S. Chief Information Officer
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workship II November 4-5, 2010 to update government and industry stakeholders on developing cloud standards. Federal CIO Vivek Kundra...
Mediacorp
Countering Fake News in Indonesia
In this video, Ridwan Kamil, a politician in Indonesia, faces the challenge of combating fake news and negative campaigns on social media. With the help of a dedicated team, they monitor and respond to comments, create counter memes, and...
Curated Video
Explain web security : Basic Terminologies
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Physics Girl
Quantum Cryptography Explained
With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Identity Management Systems
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO). This clip is...
Institute for New Economic Thinking
Government as the Solution, not the Problem
In part 1 of INET's interview with Fred Block, he says that government investment in innovation is essential: in fact, even during the era of Ronald Reagan, the US government played a key role in developing new technologies and the Internet
Brainwaves Video Anthology
Jackie Gerstein - Moving Education from 1.0 to 3.0
Dr. Jackie Gerstein's byline is, "I don't do teaching for a living. I live teaching as my doing . . . and technology has amplified my passion for doing so." Gerstein has been teaching in-person and online for several decades. Currently...
Religion for Breakfast
Is Jediism a Religion?
Jediism came to prominence in 2001 during the UK census when a bunch of people claimed to be "Jedi" as their religion. But there also is a real-world movement of people calling themselves Jediists, followers of Jediism. How should...
Brainwaves Video Anthology
Juan Parada - Learning from Failure
Juan M. Parada, is a technologist, media critic, web developer, consultant, digital strategist, DJ, business owner, and Associate Professor at the University of the Arts in Philadelphia, PA. Mr. Parada has been a part of the Interactive...
XKA Digital
Strive to make your own products redundant
Julian has spent his entire working career working in information technology and turning ideas into software services or businesses at Apple, AT&T Unisource, the UK Government and as the founder of his own Internet software companies....
Mediacorp
Uncovering the Dark Side of Misinformation in Indonesia
This video highlights the consequences of fake news in Indonesia, where it has led to violence, conflicts, and the spread of hate speech. The video also showcases the role of tech idealists in using technology for good and promoting...
Curated Video
Describe network protocols : Network Layers
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will have a look at Network Layers and learn something about...
Mediacorp
The Rise of Social Media Preachers in Indonesia
This video explores the phenomenon of social media influencers in Indonesia, specifically focusing on religious preachers like Felix Sierra who have gained millions of followers online. It examines the impact of these influencers on the...
The Wall Street Journal
Kimberly Bryant and Jessica Rosenworcel on The Digital Divide
At WSJ Tech Live, Kimberly Bryant and Jessica Rosenworcel discuss how the government and privacy sector should work to bridge the digital divide.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Connecting to Dedicated and Mobile Systems
There are many modern wireless communication standards. This episode discussed the Global Positioning System (GPS), 4G and 5G cellular, Wi-Fi Direct, and mobile device tethering. This clip is from the chapter "Securing Dedicated Systems"...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy-Segment 2
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....