Brainwaves Video Anthology
Jeff Utecht - Community Trumps Content
Jeff Utecht is an educational technology consultant, educator and author. He holds a Master’s degree in Curriculum and Instruction with a focus in Technology as well as his administrative certification through Washington State. Jeff...
Next Animation Studio
SpaceX to build satellite mega constellation for Mars colony
In a recent interview with TIME magazine, SpaceX president and COO Gwynne Shotwell revealed the company’s latest Mars plans. She said: "Once we take people to Mars, they’re going to need a capability to communicate. In fact I think it...
Science360
4 Awesome Discoveries and a Thing You Probably Didn’t Hear About - Episode 40
In this science video: The singing, song-writing robot; privacy advisory; cloud seeding succeeding; safer self-driving; and arming yourself with tentacles. It’s 4 Awesome Discoveries and a Thing You Probably Didn’t Hear About. New...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Password Attacks
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks. This clip is from the chapter "Securing...
Programming Electronics Academy
Connect Arduino to internet over USB (with Processing) - Simple Space Weather meter example (Part 1)
Have you ever wanted to connect your Arduino to the internet? Your first thought was probably like okay, I guess I'll need some type of Wi-Fi shield or a Wi-Fi enabled board in order to connect to the internet. But what if you're...
The Business Professor
Website URL and Social Media Handles
This Video Explains Website URL and Social Media Handles
Neuro Transmissions
How the internet turns us into trolls
We may have all engaged in some sort of unpleasant behavior thanks to the internet. But what makes someone want to troll the families of dead children or celebrities or vulnerable people? What is the psychology of trolls? How does...
Mediacorp
The Power of Mothers in Combating Hoaxes in Indonesia
In this video, a group of Indonesian housewives are being trained to combat fake news through the use of a hoax Buster app. With the rise of extremist groups targeting vulnerable recruits online, these mothers are taking the...
All In One Social Media
7 Ways To Market WITHOUT Facebook or Instagram
It feels like Facebook and Instagram is a dumpster fire these days but you probably feel like you have to be posting there. WRONG! I haven't posted to my Facebook Page for MONTHS and my business is booming because I am marketing my...
Next Animation Studio
Remote ID system proposed for drones in U.S. airspace
The Federal Aviation Administration has proposed using remote identification for unmanned aircraft systems in the U.S.
Mediacorp
Understanding Online Vigilantism and Its Impact on Social Media
This video discusses the issue of online vigilantism in Singapore, focusing on two specific cases: SMRT feedback, an anonymous group accused of harassment, and Roads.sg, a website that exposes bad behavior on the roads. The video...
APMonitor
Python Import Online Data and Analyze
There are many online sources of data. Python is capable to access, parse, and display data from databases, data streams, or other sources. The Internet of Things (IoT) depends on devices and programs (such as Python) communicating with...
All In One Social Media
What Is Reputation Management? - Online Reputation Management 101
What Is Reputation Management? - Online Reputation Management 101 // Your online reputation can be a huge asset and help drive you sales and referrals. It can also hurt you and harm your brand with poo reviews and feedback even if you...
AllTime 10s
10 False Memories Everyone Believes
Humpty Dumpty was your favourite childhood egg right? Well maybe not favourite, but he wasn't a bad egg. Wait? What?! He wasn't even an egg?!?! Well I never. Here are 10 more well I never false memories everyone believes.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Weak Configurations
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be...
Tarver Academy
How to protect yourself with good, strong passwords - DIGITAL CITIZENSHIP
In This Episode, Tyler Teaches Us About How to protect yourself with good, strong passwords - DIGITAL CITIZENSHIP
Brainwaves Video Anthology
David Ryan Polgar - Mental Obesity
David is an ambidextrous thinker who likes big ideas. As a “Tech Ethicist,” he explores our evolving relationship with social media and tech from an ethical, legal, and emotional perspective. Utilizing his background as an attorney,...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk - Attackers and Types of Attacks - Part 1
This is the first part of the two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Brainwaves Video Anthology
Sugata Mitra - Beyond the Hole in the Wall - AERO Conference 2015
Sugata Mitra is Professor of Educational Technology at the School of Education, Communication and Language Sciences at Newcastle University, UK. He was given the $1m TED Prize in 2013 in recognition of his work and to help build a School...
Financial Times
The internet of broken things: it may be time to start again
The internet has become an indispensable tool, but the FT’s Hannah Kuchler thinks it is in urgent need of repair. She also says that as we put more physical objects online, from self-driving cars to nuclear power plants, risk of fatal...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - DNS Security
DNS is a crucial network service used by everybody to resolve names to IP addresses and as a result, it is a target for attackers. This episode also discusses other protocols such has Simple Network Management Protocol (SNMP) and Secure...
Next Animation Studio
5G Internet drones: Google testing giant UAVs high above New Mexico desert
Internet behemoth Google is experimenting with drones that could deliver Internet speeds up to 40 times faster than 4G, according to a report in the Guardian. The Google project, known as Skybender, is using Spaceport America in New...
Science360
COULD YOU LOVE MATH?
Jere Confrey is an NSF-funded researcher at the College of Education at NC State University. Her work in mathematics education provides a valuable perspective on the challenges and opportunities around having a positive relationship with...