Instructional Video3:22
Programming Electronics Academy

What is Serial.begin(9600)?

Higher Ed
WHAT IS SERIAL.BEGIN(9600)? Are you wondering what Serial.begin(9600) does? You’ve probably seen it in most of the Arduino programs you’ve looked at – but what’s it there for?! Do you even need to use Serial.begin()? What if you change...
Instructional Video4:16
Packt

Describe a data structure : What Are Data Structures and Why Are They Important?

Higher Ed
From the section: Introduction to Data Structures and Important Concepts. This section introduces Data Structures and important concepts of DS and explains why they are important Introduction to Data Structures and Important Concepts:...
Instructional Video7:49
Packt

Introduction to computer hardware and software : Inside the PC

Higher Ed
From the section: The Visible Computer. In this section, we learn more about primary PC computer, external connections and learn more about computer. Geeks go into PC cases and this episode is a case in point, if you’ll pardon the pun....
Instructional Video20:07
Institute for New Economic Thinking

Yvo Desmedt: Much Ado About Cyber Security

Higher Ed
Private data is leaked more and more in our society. Wikileaks, Facebook, and identity theft are just three examples. Network defenses are constantly under attack from cyber criminals, organized hacktivists, and even disgruntled...
Instructional Video8:48
Paul Marriott

Tutorial: Automatic Smart Fan Step-by-Step w/Arduino Nano, Shield, DHT11, Relay Switch & mBlock 5

9th - 12th
Full-fledged tutorial (with diagrams) for an automated smart fan prototype system. Fan is programmed to turn on and off when temperature sensor reaches a certain temperature. Uses Arduino Nano microcontroller with a special connectivity...
Instructional Video3:40
FuseSchool

Get to know your smartboard - SMART tutorials for teachers - the virtual school

6th - Higher Ed
Find out what the Buttons on your SMART Board can be used for to master all of its functions!
Instructional Video1:10
Kids’ Poems and Stories With Michael Rosen

Don't - Kids Poems and Stories With Michael Rosen

Pre-K - 5th
Michael Rosen performing the poem Don't. This poem comes from ‘Mustard, Custard, Grumble Belly and Gravy’ (Bloomsbury Children’s Books).
Instructional Video4:56
All In One Social Media

How To Boost Posts On Facebook

Higher Ed
How To Boost Posts On Facebook // You spend a lot of time creating content to share on Facebook. But with the decline of organic reach, are you seeing enough return on that investment? This is where the Facebook boost post feature comes...
Instructional Video7:29
Programming Electronics Academy

Display Arduino output (e.g. sensor data) on your computer monitor with this simple function: Part 1

Higher Ed
In many cases while using an Arduino, you will want to see the data being generated by the Arduino. One common method of doing this is using the print() function from the Serial library to display information to your computer’s monitor....
Instructional Video7:56
Curated Video

Influences on Business Mission and Objectives

Higher Ed
This video is a lecture presentation that discusses the influences on a business's mission and objectives. The presenter provides a recap of the differences between mission, objectives, and strategy, and uses the analogy of chess to...
Instructional Video3:01
National Institute of Standards and Technology

Password Security Fatigue

9th - 12th
Ever get tired of having to update your username and password? In this video, Mary Theofanos explains the idea of security fatigue and how users are bogged down by too many decisions involving their online security. Creating awareness...
Instructional Video8:59
Paul Marriott

Tutorial: How a 7-Segment Display works w/Arduino Uno

9th - 12th
Originally part of a live school podcast, this tutorial demonstration shows you how a 7-segment display works. Use of Arduino Uno microcontroller, half breadboard and a common cathode 7-segment display module.
Instructional Video9:11
Curated Video

CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - Hardware architecture

Higher Ed
CISSP Domain 3: System Architecture and Engineering: Hardware architecture. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security Architecture and...
Instructional Video9:40
Programming Electronics Academy

Tiny Arduino Compatible GPS Car Tracker :: James Bond Wanna Be

Higher Ed
Isn’t it hard to finish watching a spy movie and not want to do something...spy-like? You know, like having 40 video cameras in your house, dancing the tango with some ambassador, or jumping off a helicopter onto a wild cheetah? Well -...
Instructional Video3:17
Science360

The future of encryption

12th - Higher Ed
With so much of our information now stored or processed in the cloud, how can we make sure our data is safe from unauthorized access? The National Science Foundation is funding researchers working to develop new, more robust encryption...
Instructional Video7:09
Science360

Researchers explore how babies learn! NSF Science Now 30

12th - Higher Ed
In this week’s episode, we explore how babies learn, discover what is threatening coral reefs, see how coffee house hackers are stealing computer data and, finally, we explore our memories. Check it out!
Instructional Video7:08
Packt

State the purpose of network hardware : Hexadecimal

Higher Ed
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. The central box that connects devices on our LANs has gone through many advancements over the years. Whether hubs or...
Instructional Video11:42
Institute for New Economic Thinking

Domenico Delli Gatti - Microfoundations for the Vision of Minsky

Higher Ed
Delli Gatti starts where his dissertation advisor, Hyman Minsky, left off. With tools from network theory and agent-based modeling, he simulates the economy as enormous web of credit relations. He says agent-based models can capture a...
Instructional Video6:18
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Shells

Higher Ed
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station. This clip is from the chapter "Tools of...
Instructional Video2:34
Science360

Mind Reading Computer System May Help People With Locked-In Syndrome

12th - Higher Ed
Imagine living a life in which you are completely aware of the world around you but you're prevented from engaging in it because you are completely paralyzed. Even speaking is impossible. For an estimated 50,000 Americans this is a harsh...
Instructional Video24:02
The Wall Street Journal

The Future of Mobility

Higher Ed
Toyota Chairman Takeshi Uchiyamada and WSJ Tokyo Bureau Chief Peter Landers discuss the future of transportation technology and its effects on the world around us.
Instructional Video2:48
Science360

Computer scientist Anthony Joseph - ScienceLives

12th - Higher Ed
The Cold War may be over, but silent dangers still lurk in cyber space. With increasing amounts of sensitive personal information — social security numbers, financial data, stock transactions — finding its way onto computing networks,...
Instructional Video4:15
Science360

Climate Models - How Do We Know?

12th - Higher Ed
How are climate models on climate change being improved?
Instructional Video5:20
IDG TECHtalk

How to set up email security rules in Microsoft Office 365

Higher Ed
Microsoft has rolled out new security settings for Office 365, but the default configuration for email might not be right for your organization.