Instructional Video17:35
Curated Video

Introduction to Termux

Higher Ed
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Instructional Video13:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Account Management

Higher Ed
Accountability for resource access is possible only with people using their own unique user accounts where the principle of least privilege has been applied, ideally through group-assigned permissions. Account policies can determine...
Instructional Video7:36
Practical Ninjas

What makes our phones smart? - SOC | System on Chip | Brain of a smartphone

12th - Higher Ed
What makes our phones smart? - SOC ------------------------------------------------------------- In this age of digitisation, the one thing that we have on us is undoubtedly the smartphone. Some smartphones are great while some are just...
Instructional Video0:52
Next Animation Studio

FDA approves first indigestible medical sensor

12th - Higher Ed
The FDA has approved the first medical sensor pill that sends biostat messages to a smartphone via a patch worn on the stomach. The pill tells a patient whether they have taken their medication, and can also record vital stats such as...
Instructional Video1:39
Next Animation Studio

Deep-sea ‘gold rush’ led by China could be about to devastate the oceans

12th - Higher Ed
A deep-sea ‘gold rush’ led by China could soon have catastrophic consequences for marine ecosystems.
Instructional Video2:22
Science ABC

USB Types: Various Types of USB Cables (A, B and C) and Their Differences

Pre-K - Higher Ed
USB cables are of different types like Type A, Type B and Type C. This classification is based on type of the connector found at the end of a USB connector. Another way to classify USB is based on its generation like: USB 1.0 (oldest),...
Instructional Video3:52
Curated Video

Do Microwaves Interfere With WiFi Signals?

Pre-K - Higher Ed
Yes. Microwaves and radio waves are physically the same, i.e. both are forms of electromagnetic radiation. Some microwave rays can leak out and interfere with WiFi signals. We are basically constantly surrounded by electromagnetic...
Instructional Video11:04
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Mobile Device Deployment and Hardening

Higher Ed
Organizations normally allow the use of personal or work-issued mobile devices for work purposes through provisioning schemes such as Bring Your Own Device (BYOD) and Choose Your Own Device (CYOD). This episode also discusses Subscriber...
Instructional Video12:14
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Digital Forensics

Higher Ed
The application of computer science to legal situations include evidence gathering is referred to as digital forensics. This episode covers e-discovery and steganography. This clip is from the chapter "Dealing with Incidents" of the...
Instructional Video8:21
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Wi-Fi Coverage and Performance

Higher Ed
Optimizing Wi-Fi communication means ensuring there is proper coverage over a given area and that there are no wireless interference issues from other transmitting devices. A wireless site survey with a heat map can identify overlapping...
Instructional Video5:07
Curated Video

5G and Wireless Communication for Beginners - Extra Story 03: Setting up the Market Landscape with/without FRAND (Fair, Reasonable, and Non-discriminatory)

Higher Ed
This video explains how to set up the market landscape with/without FRAND. This clip is from the chapter "Expanding Mobile Internet with 3G" of the series "5G and Wireless Communication for Beginners".This section explains expanding...
Instructional Video13:57
Curated Video

Why New Business Ideas Come About: The Pressures That Force Them

12th - Higher Ed
This video is a lecture presentation that discusses why new business ideas come about. The speaker talks about the importance of businesses reacting to changes, including changes in consumer tastes and preferences, technological...
Instructional Video10:05
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Internet of Things (IoT) Devices

Higher Ed
IoT devices are function-specific and can communicate over the Internet. Examples include environmental control devices, medical devices, and video surveillance systems. This episode also covers the Zigbee smart home automation protocol....
Instructional Video0:43
Next Animation Studio

What causes smartphone glass to break

12th - Higher Ed
Whether a smartphone screen will shatter or escape destruction depends on a few factors. Two of these factors include; hardness and strength of the glass. Glass breaks when the force of impact becomes stronger than surface compression. A...
Instructional Video2:51
Science360

The spy who hacked me - Measuring the security vulnerabilities of 3-D printing

12th - Higher Ed
In episode 65, Jordan and Charlie explore how a smartphone can hack a 3-D printer by measuring leaked energy and acoustic waves. Despite features such as encryption and watermarks, researchers at the University at Buffalo have found...
Instructional Video6:47
Science360

NSF Science Now: Episode 18

12th - Higher Ed
In this week's episode we dig up the ""King of Gore,"" the oldest discovered Tyrannosaurid dinosaur yet. We also learn how ordinary foam can help protect athletes from concussions and how a tongue-controlled wheelchair could give people...
Instructional Video6:51
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - RFID, NFC, and Bluetooth

Higher Ed
While there are many wireless network standards, which ones are designed for close proximity? This video covers RFID, NFC and Bluetooth wireless network communications. This clip is from the chapter "Securing Wireless LANs" of the series...
Podcast26:52
NASA

‎NASA in Silicon Valley: Roger Hunter Talks About Taking Big Risks with Small Satellites

Pre-K - Higher Ed
A conversation with Roger Hunter, Program Manager for the Spacecraft Technology Program at NASA’s Ames Research Center in Silicon Valley.
Instructional Video39:57
Paul Marriott

Blynk IoT (Blynk 2.0) App w/Arduino Uno R3, ESP8266 ESP-01 Module, Blynk Cloud & 4 x LED - Tutorial

9th - 12th
A full fledged tutorial of 4 LEDs connected to an Arduino device via. Blynk IoT (aka Blynk 2.0), Blynk Cloud and the ESP8266 ESP-01 WiFi module. The device simulates 'lights' of a smart home by turning LEDs on and off through 'Blynk IoT'...
Instructional Video2:27
Science360

SMARTPHONE-COMPATIBLE DEVICE TO DETECT MISLABELED DRUGS

12th - Higher Ed
A new more affordable, portable, smartphone-compatible spectrometer could soon help users detect mislabeled or fake pills. The device, which is being developed by NSF-funded small business Stratio, Inc., is based on a shortwave infrared...
Instructional Video6:47
Science360

Scientists discover the King of Gore ! NSF Science Now 18

12th - Higher Ed
In this episode, we dig up the “King of Gore,” the oldest discovered Tyrannosaurid dinosaur yet. We also learn how ordinary foam can help protect athletes from concussions and how a tongue-controlled wheelchair could give people with...
Instructional Video10:11
Limonero Films

Kodak: A Tale of Missed Opportunities in the Digital Age

12th - Higher Ed
This video explores how Kodak, once a dominant force in the photography industry, failed to adapt to the rise of digital technology and smartphones, ultimately leading to its downfall and bankruptcy. It highlights the importance of...
Instructional Video3:45
Curated Video

Google Maps Secrets: How Exactly Does Google Maps Work?

Pre-K - Higher Ed
How Google Maps work? How does Google Maps know about the traffic conditions? How is it so accurate about predicting traffic conditions? This is a short, animated videos for kids and laymen to understand the science and technology that...
Instructional Video2:34
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Smartphone Hardening Lab

Higher Ed
Smartphones are small computers that almost everybody carries around with them. Many standard desktop computers hardening techniques can be applied to smartphones. This clip is from the chapter "Securing Dedicated Systems" of the series...