Curated Video
Apple Boosts iPhone Security After Spyware Find
FOR CLEAN VERSION SEE STORY NUMBER: apus061994APPLE ISSUED AN IPHONE SECURITY UPDATE AFTER RESEARCHERS UNCOVERED POWERFUL ESPIONAGE SOFTWARE ON AN ACTIVIST'S PHONE IN THE MIDDLE EAST. APPLE IN A STATEMENT SAYS IT FIXED THE VULNERABILITY...
TED Talks
Ray Kurzweil: The accelerating power of technology
Inventor, entrepreneur and visionary Ray Kurzweil explains in abundant, grounded detail why, by the 2020s, we will have reverse-engineered the human brain and nanobots will be operating your consciousness.
TED Talks
Ray Kurzweil: A university for the coming singularity
Ray Kurzweil's latest graphs show that technology's breakneck advances will only accelerate -- recession or not. He unveils his new project, Singularity University, to study oncoming tech and guide it to benefit humanity.
TED Talks
Paul MacCready: Nature vs. humans
In 1998, aircraft designer Paul MacCready looks at a planet on which humans have utterly dominated nature, and talks about what we all can do to preserve nature's balance. His contribution: solar planes, superefficient gliders and the...
TED Talks
TED: How to upgrade democracy for the Internet era | Pia Mancini
Pia Mancini and her colleagues want to upgrade democracy in Argentina and beyond. Through their open-source mobile platform they want to bring citizens inside the legislative process, and run candidates who will listen to what they say.
Curated Video
Digitalization of X-ray Imaging: Revolutionizing Healthcare in England
This video highlights the transition from traditional X-ray films to digital imaging and storage in hospitals across England. The nationwide computerized system allows doctors to make diagnoses from screens, eliminating the need to...
Curated Video
Stuxnet
Stuxnet, a powerful cyber weapon used to disrupt Iran's nuclear advancements at the Natanz facility in 2010, marked a pivotal moment in the history of cyber warfare.
Curated Video
South Korea's Innovative Computer Fashion Show: Blending Technology and Fashion for Everyday Life
South Korea's recent computer fashion show showcased wearable technology integrated into clothing for military officers, firefighters, and working mothers. From robotic devices aiding in lifting heavy objects to vests measuring fitness...
Curated Video
The Evolution of Workplace Technology: From Calculators to Handheld Computers
The video explores the evolution of workplace technology, focusing on the impact of the handheld calculator introduced by Texas Instruments. It highlights how this innovation revolutionized office tasks, leading to advancements in...
Curated Video
Ensuring Information Security: Challenges and Preparations for Major Events
The video discusses the importance of information security in the world of technology, highlighting the potential threats from organized crime and individual hackers. It also mentions the massive undertaking of ensuring information...
The Business Professor
Manufacturing Functions - Explained
What are Manufacturing Functions? Functions related to manufacturing operations may include the design and development of production lines, purchasing raw materials and components, selection of raw material suppliers and subcontractors,...
Curated Video
Tomorrow's Energy
Andrew Hoffman, Professor of Sustainable Enterprise at the University of Michigan, gives us a taste of how he thinks the world’s view on energy will change radically over the next 30 years.
Curated Video
History of the Hashtag
Everyday, millions of people around the world use hashtags to sift through the Internet’s endless content – but where did this ubiquitous symbol actually come from?
Curated Video
Introduction to IT and Cybersecurity: Basics, Protocols, and Future Trends
Part 1/16 of Introduction to IT and Cybersecurity series: The video is an introduction to the course "Introduction to IT and Cybersecurity." The course covers topics such as IT hardware and software, networking, servers, databases,...
Curated Video
Introduction to IT and Cybersecurity: Functional Areas of IT Operations
Part 6/16 of Introduction to IT and Cybersecurity series: The video discusses the various functional areas of an IT department, starting with the basic organizational chart that includes positions such as IT manager, CTO/CIO, application...
Curated Video
Introduction to IT and Cybersecurity: Essentials of Networking
Part 2/16 of Introduction to IT and Cybersecurity series: This video is an introductory lesson on networking essentials. The presenter first defines various communication terminologies used in networking, and explains devices such as...
Curated Video
Introduction to IT and Cybersecurity: Web Infrastructure
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...
Curated Video
Introduction to IT and Cybersecurity: Servers Essentials
Part 3/16 of Introduction to IT and Cybersecurity series: This video discusses the concept of client-server and its importance in distributed application structures. Examples of client-server settings are LAN networks where a central...
Curated Video
Introduction to IT and Cybersecurity: Software Licensing
Part 9/16 of Introduction to IT and Cybersecurity series: This video discusses software licensing and the different schemes applied in on-premise and on-cloud environments. It also outlines the types of licenses available, including...
Curated Video
Introduction to IT and Cybersecurity: Databases Essentials
Part 5/16 of Introduction to IT and Cybersecurity series: The video explains the concept of databases and database management systems (DBMS) by defining these terms and discussing their functions, structures, and advantages and...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 1
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 5
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC. ...
National Institute of Standards and Technology
Vivek Kundra Keynote at the Cloud Computing Forum & Workshop
Federal CIO Vivek Kundra's keynote at the Cloud Computing Forum & Workshop May 20, 2010. Kundra describes the gap between consumers access to IT and the government. He calls for cloud computing to narrow this gap while maintaining...
National Institute of Standards and Technology
Remarks of Cita Furlani - Information Technology Lab Director, NIST
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workshop II November 4-5, 2010 to update government and industry stakeholders on developing cloud computing standards. Cita Furlani,...