News Clip2:44
Curated Video

Apple Boosts iPhone Security After Spyware Find

Higher Ed
FOR CLEAN VERSION SEE STORY NUMBER: apus061994APPLE ISSUED AN IPHONE SECURITY UPDATE AFTER RESEARCHERS UNCOVERED POWERFUL ESPIONAGE SOFTWARE ON AN ACTIVIST'S PHONE IN THE MIDDLE EAST. APPLE IN A STATEMENT SAYS IT FIXED THE VULNERABILITY...
Instructional Video22:56
TED Talks

Ray Kurzweil: The accelerating power of technology

12th - Higher Ed
Inventor, entrepreneur and visionary Ray Kurzweil explains in abundant, grounded detail why, by the 2020s, we will have reverse-engineered the human brain and nanobots will be operating your consciousness.
Instructional Video8:41
TED Talks

Ray Kurzweil: A university for the coming singularity

12th - Higher Ed
Ray Kurzweil's latest graphs show that technology's breakneck advances will only accelerate -- recession or not. He unveils his new project, Singularity University, to study oncoming tech and guide it to benefit humanity.
Instructional Video22:42
TED Talks

Paul MacCready: Nature vs. humans

12th - Higher Ed
In 1998, aircraft designer Paul MacCready looks at a planet on which humans have utterly dominated nature, and talks about what we all can do to preserve nature's balance. His contribution: solar planes, superefficient gliders and the...
Instructional Video13:24
TED Talks

TED: How to upgrade democracy for the Internet era | Pia Mancini

12th - Higher Ed
Pia Mancini and her colleagues want to upgrade democracy in Argentina and beyond. Through their open-source mobile platform they want to bring citizens inside the legislative process, and run candidates who will listen to what they say.
Instructional Video1:32
Curated Video

Digitalization of X-ray Imaging: Revolutionizing Healthcare in England

Pre-K - Higher Ed
This video highlights the transition from traditional X-ray films to digital imaging and storage in hospitals across England. The nationwide computerized system allows doctors to make diagnoses from screens, eliminating the need to...
Instructional Video2:35
Curated Video

Stuxnet

9th - Higher Ed
Stuxnet, a powerful cyber weapon used to disrupt Iran's nuclear advancements at the Natanz facility in 2010, marked a pivotal moment in the history of cyber warfare.
Instructional Video3:30
Curated Video

South Korea's Innovative Computer Fashion Show: Blending Technology and Fashion for Everyday Life

Pre-K - Higher Ed
South Korea's recent computer fashion show showcased wearable technology integrated into clothing for military officers, firefighters, and working mothers. From robotic devices aiding in lifting heavy objects to vests measuring fitness...
Instructional Video5:48
Curated Video

The Evolution of Workplace Technology: From Calculators to Handheld Computers

Pre-K - Higher Ed
The video explores the evolution of workplace technology, focusing on the impact of the handheld calculator introduced by Texas Instruments. It highlights how this innovation revolutionized office tasks, leading to advancements in...
Instructional Video1:05
Curated Video

Ensuring Information Security: Challenges and Preparations for Major Events

Pre-K - Higher Ed
The video discusses the importance of information security in the world of technology, highlighting the potential threats from organized crime and individual hackers. It also mentions the massive undertaking of ensuring information...
Instructional Video4:26
The Business Professor

Manufacturing Functions - Explained

Higher Ed
What are Manufacturing Functions? Functions related to manufacturing operations may include the design and development of production lines, purchasing raw materials and components, selection of raw material suppliers and subcontractors,...
Instructional Video2:36
Curated Video

Tomorrow's Energy

12th - Higher Ed
Andrew Hoffman, Professor of Sustainable Enterprise at the University of Michigan, gives us a taste of how he thinks the world’s view on energy will change radically over the next 30 years.
Instructional Video2:08
Curated Video

History of the Hashtag

9th - Higher Ed
Everyday, millions of people around the world use hashtags to sift through the Internet’s endless content – but where did this ubiquitous symbol actually come from?
Instructional Video12:11
Curated Video

Introduction to IT and Cybersecurity: Basics, Protocols, and Future Trends

Higher Ed
Part 1/16 of Introduction to IT and Cybersecurity series: The video is an introduction to the course "Introduction to IT and Cybersecurity." The course covers topics such as IT hardware and software, networking, servers, databases,...
Instructional Video6:43
Curated Video

Introduction to IT and Cybersecurity: Functional Areas of IT Operations

Higher Ed
Part 6/16 of Introduction to IT and Cybersecurity series: The video discusses the various functional areas of an IT department, starting with the basic organizational chart that includes positions such as IT manager, CTO/CIO, application...
Instructional Video22:20
Curated Video

Introduction to IT and Cybersecurity: Essentials of Networking

Higher Ed
Part 2/16 of Introduction to IT and Cybersecurity series: This video is an introductory lesson on networking essentials. The presenter first defines various communication terminologies used in networking, and explains devices such as...
Instructional Video10:05
Curated Video

Introduction to IT and Cybersecurity: Web Infrastructure

Higher Ed
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...
Instructional Video1:28
Curated Video

Introduction to IT and Cybersecurity: Servers Essentials

Higher Ed
Part 3/16 of Introduction to IT and Cybersecurity series: This video discusses the concept of client-server and its importance in distributed application structures. Examples of client-server settings are LAN networks where a central...
Instructional Video6:50
Curated Video

Introduction to IT and Cybersecurity: Software Licensing

Higher Ed
Part 9/16 of Introduction to IT and Cybersecurity series: This video discusses software licensing and the different schemes applied in on-premise and on-cloud environments. It also outlines the types of licenses available, including...
Instructional Video10:20
Curated Video

Introduction to IT and Cybersecurity: Databases Essentials

Higher Ed
Part 5/16 of Introduction to IT and Cybersecurity series: The video explains the concept of databases and database management systems (DBMS) by defining these terms and discussing their functions, structures, and advantages and...
Instructional Video13:06
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 1

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Instructional Video34:28
National Institute of Standards and Technology

Cybersecurity and Innovation in the Information Economy - Segment 5

9th - 12th
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC. ...
Instructional Video16:53
National Institute of Standards and Technology

Vivek Kundra Keynote at the Cloud Computing Forum & Workshop

9th - 12th
Federal CIO Vivek Kundra's keynote at the Cloud Computing Forum & Workshop May 20, 2010. Kundra describes the gap between consumers access to IT and the government. He calls for cloud computing to narrow this gap while maintaining...
Instructional Video10:38
National Institute of Standards and Technology

Remarks of Cita Furlani - Information Technology Lab Director, NIST

9th - 12th
The National Institute of Standards and Technology (NIST) sponsored the Cloud Computing Forum and Workshop II November 4-5, 2010 to update government and industry stakeholders on developing cloud computing standards. Cita Furlani,...