IDG TECHtalk
What the Colonial Pipeline ransomware attack suggests about critical infrastructure security
The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Industrial Control Systems
CISSP Domain 3: System Architecture and Engineering: Industrial Control Systems This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Brainwaves Video Anthology
Patricia and Jack Phillips - Show the Value of What You Do
Patti is the CEO of the ROI Institute Inc. She helps organizations implement the ROI Methodology in more than seventy countries around the world. Her work spans the private sector, public sector, nonprofits, and nongovernmental...
The Wall Street Journal
Richard Branson and Dan Hart On Virgin's Space Odyssey
At WSJ Tech Live, Richard Branson and Virgin Orbit CEO Dan Hart discuss their challenges in standing out in the satellite launch business.
Next Animation Studio
U.S. field tests high-energy laser weapon: Pacific Fleet Command
The U.S. Navy shot down an aerial drone with a solid state laser weapon during a test off Pearl Harbor on May 16.
NASA
Gravity Assist: Gravity Assist Podcast: Meet NASA Administrator Jim Bridenstine
NASA’s got big plans to send people to the Moon, and then on to Mars. What are we going to do at the Moon?
NASA
NASA's Curious Universe: Earth’s Expanding Oceans
With Earth’s recent record-breaking temperatures, the pace of sea level rise has accelerated. NASA scientists take us on a trip into their research right here on our home planet. Join us as we fly over Antarctic ice sheets and consult...
Science360
Chalk Talk Binary
A binary system of numbers is one that is composed only of ones and zeros. It was the system of choice for people who developed early computers--they needed a reliable way to get information across electrical circuits, and a way that was...
Institute of Art and Ideas
Are thinking machines really a threat?
Evil artificial intelligences are luckily confined to fiction. Yet leading scientists claim that intelligent machines are 'the most serious threat facing mankind'. Are they right or could a mind free from human prejudices create a better...
Curated Video
Bronfenbrenner's Ecological Systems: 5 Forces Impacting Our Lives
The video discusses Bronfenbrenner's ecological system theory, which proposes that a child's development is influenced by five ecological forces: micro, meso, exo, macro, and chrono systems. It explains how these systems shape a child's...
Zach Star
Dream Employers for Engineering Students
In 2013 Forbes came out with an article titled "Dream Employers for Engineering Students." In this video I discuss 5 of those companies and briefly go over what they work on and what you should know about them as well as some advice for...
TLDR News
How Apple & Google COVID Tracing Apps Work: Government Surveillance or High Tech Genius? - TLDR News
A couple of months ago Apple & Google announced their API to help governments track COVID. Since then Google & Apple have begun rolling out their systems, updating their OS and preparing while governments have begun implementing the...
The Wall Street Journal
Force Multipliers
How can technologies like edge and quantum computing and advanced automation be best deployed?
NASA
NASA in Silicon Valley: Leighton Quon Talks About New Air Traffic System Demonstrations
A conversation with Leighton Quon, project manager in the Airspace Technology Division at NASA’s Ames Research Center in Silicon Valley.
Brian McLogan
Applying substitution to solve a system of equations with infinite many solutions
👉Learn how to solve a system of equations by substitution. To solve a system of equations means to obtain a common values of the variables that makes the each of the equation in the system true. To solve a system of equations by...
Curated Video
Determining Infinitely Many Solutions in a System of Linear Equations by Graphing
In this video, the teacher explains how to determine if a system of two linear equations in two variables has infinitely many solutions by graphing. The teacher reviews the slope-intercept form of an equation and demonstrates how to...
The Wall Street Journal
Goodbye Passwords?
New standards for authentication are emerging to take the place of passwords, with the promise of more security and less complexity. Explore how these will change interactions with customers and security access for employees.
NASA
XMM-Newton Celebrates 20 Years in Space
Scientists reflect on XMM-Newton’s 20th anniversary. The mission, led by ESA (European Space Agency), has dramatically improved our understanding of the cosmos thanks to detailed X-ray observations. NASA funded two of its three...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Business Continuity Planning - Part 2
This is the second part of a two-part video that explains business continuity planning. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Brainwaves Video Anthology
Michelle King - The Learning Instigator
Michelle King is a teacher at the Environmental Charter School and publisher of The Learning Instigator. Michelle King is a learner first and foremost. A teacher. An instigator. She learned and honed her craft in Mt. Lebanon with a...
Science360
Supercomputers aid researchers in hunt for COVID-19 answers
The computing power of more than a million laptops combined. That's the firepower a network of NSF-supported supercomputing resources brings to the fight against COVID-19. From atomic scale models of the virus' structure, to modeling the...
Curated Video
Explain web security : Understand-ing Bit Hacker Jar-gon!
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Brian McLogan
Graphing a System of Equations by Eliminating the Fractions
👉Learn how to solve a system (of equations) by elimination. A system of equations is a set of equations which are collectively satisfied by one solution of the variables. The elimination method of solving a system of equations involves...
Curated Video
Predicting Solutions of Linear Equations
In this video, the teacher explains how to determine the number of solutions in a system of linear equations by inspection. They review the slope-intercept form of equations and demonstrate how to graph them. The teacher also explains...