Zach Star
This is What my First Engineering Job was Like
This video covers my experience in my first engineering job out of college. As I mention in the video, this does not represent all jobs, but should give you an idea of what mine was like. At my job I was mostly on the computer but did...
Mazz Media
Internet Safety- internet Advertising and Keeping Yourself Safe
Students will learn to alert to offers made online that seem too good to be true. Through a series of true-to-life scenarios, viewers will come to understand that scammers target individuals in order to get money or information. Students...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Microsoft PowerShell
Is there a better way to automate operating system commands than through scripts and text manipulation? Yes! Microsoft PowerShell is an object-oriented cross-platform command environment that uses a verb-noun type of syntax, such as with...
NASA
NASA in Silicon Valley: Bron Nelson and Dimitris Menemenlis Talk About Modeling Oceans and Ice With Supercomputers
A conversation with Bron Nelson, a computer programmer with the Data Analysis and Visualization Group at NASA’s Ames Research Center in Silicon Valley, and Dimitris Menemenlis, a research scientist working with the Estimation of the...
Curated Video
Describe network protocols : Review of Network Programming
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, will learn about the basics of Network programming in general. •...
Science360
BIG DATA TO INDIVIDUALIZE MANAGEMENT OF CHRONIC DISEASES
Some chronic conditions, such as the autoimmune disease scleroderma, are especially difficult to treat because patients exhibit highly variable symptoms, complications and treatment responses. The process of finding an effective...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Incident Response Overview
Responding to incidents in a timely and effective manner is the result of proactive planning with defined roles and responsibilities. This clip is from the chapter "Dealing with Incidents" of the series "CompTIA Security+ Certification...
IDG TECHtalk
Machine learning and AI advancements
The hype around artificial intelligence and machine learning is giving way to real use. Join us as InfoWorld’s Serdar Yegulalp and IDG TECHtalk host Ken Mingis discuss how AI and ML have become easier to put into production, how AI and...
Curated Video
How Big Is An AI Algorithm?
This video explores different ways to measure the size of an AI algorithm, including the number of layers, the size of the weights, and the computational power needed to run it. The answer to the question of how big an AI algorithm is...
Curated Video
Describe the different types of malware that could affect a computer system or network : Understand the types of malware
From the section: What are the threats?. This section includes threats, types of malware and lot more. This video gives an overview of malware and threats. It shows how to recognize malware, types of malware and how devices get them.
IDG TECHtalk
Windows 10: Answering your most important questions
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis are back to answer your questions about Windows 10.
friEdTech
Use SAS Writing Reviser on iPad
Learn how to access the AMAZING Docs Add-On SAS Writing Reviser on the iPad. This video can be used by Students with school issued iPads to learn how to improve writing.
Zach Star
Robotics Subfields and Which Majors to Pick
This video covers just a few examples of research and companies that you might find interesting in the field of robotics. I only cover a few examples but remember there are SO many more. Many companies encompass some version of robotics...
Institute of Art and Ideas
Is AI a threat to mankind?
Evil artificial intelligences are luckily confined to fiction. Yet leading scientists claim that intelligent machines are 'the most serious threat facing mankind'. Are they right or could a mind free from human prejudices create a better...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - The (ISC)2 Code of Ethics
This video explains the various ethics. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk...
The Wall Street Journal
Banking on an AI Future
J.P. Morgan is devoting a signi cant part of its tech budget to innovative technologies. Dr. Veloso will share how machine learning and AI are shaping the future of nancial services at the bank.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Hardware
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security. This clip is from the chapter "Securing...
Programming Electronics Academy
TTL Serial Communication Protocol Explained | Part 3
Let’s look at a concrete example. The ASCII character capital G is represented by the bits 0100 0111. If we were to monitor the logic levels of the TX pin on the Arduino UNO while we are printing a capital G using Serial.begin() and...
Programming Electronics Academy
Connect Arduino to internet over USB (with Processing) - Simple Space Weather meter example (Part 1)
Have you ever wanted to connect your Arduino to the internet? Your first thought was probably like okay, I guess I'll need some type of Wi-Fi shield or a Wi-Fi enabled board in order to connect to the internet. But what if you're...
Mazz Media
My Blog: When BFFs Go Bad (Responsibility in a Digital World)
Is there something on your cell phone or computer that you don’t want others to see? Is there an embarrassing photo of you on your friend’s cell phone you wouldn’t want others to see? In this program students will learn that information...
Packt
Introduction to computer hardware and software : CPU Speeds and Cores
From the section: CPUs. In this section, we explore features about CPU. Today’s AMD and Intel CPUs use the same set of instructions. A CPU’s clock speed describes (roughly) how fast it processes these instructions. Most clock speeds...
Brainwaves Video Anthology
Kirsten Cuppen - Teaching in the Global Pandemic - The Netherlands
After eight years teaching at a primary school and two years at a high school, Kirsten Cuppen currently works at an intermediate vocational college in the Netherlands that prepares trainees for jobs related to a specific trade or...