Hi, what do you want to do?
Curated Video
The Pervasiveness of Video Surveillance: Insights from Nice, the "Camera City"
Explore how the city of Nice has earned the nickname "Camera City" through its extensive network of surveillance cameras aimed at improving public safety. This report delves into the high-tech control center where the footage from 937...
Curated Video
ASP.NET 6.0 - Build Hands-On Web Projects - Controllers Folder
This video discusses the Controller folder and its content (HomeController) when the project was created with the default Model-View-Controller project template.
<
br/>
This clip is from the chapter "Coding Project Part 2: Consume...
<
br/>
This clip is from the chapter "Coding Project Part 2: Consume...
Curated Video
CISSP Crash Course - Compliance, Legal, and Regulations
This video explains compliance, legal, and regulations in domain 1.
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
<
br/>
This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and...
Seven Dimensions
Give Bad News Effectively
Learn why it is important to deliver bad news effectively;<br/>
Give bad news privately and <br/>personally;
Be clear<br/>, succinct and honest;
Be caring, supportive and willing to answer questions:
Give bad news privately and <br/>personally;
Be clear<br/>, succinct and honest;
Be caring, supportive and willing to answer questions:
Curated Video
What is Remarketing? (or Retargeting)
Have you ever been wandering about the internet and been surprised to find adverts for products you recently looked at? If you have, welcome to remarketing.
Maybe you looked at an online product and then, later that day, saw a...
Maybe you looked at an online product and then, later that day, saw a...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Virtual Private Networks and Why You Need One
This video talks about one of the most important security tools that you can have installed on your mobile device, which is known as VPN or Virtual Private Network. This is one of the best security tools because it can provide you with...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device.
<
br/>
This clip is from the chapter "Understanding Applications" of the series "The Absolute...
<
br/>
This clip is from the chapter "Understanding Applications" of the series "The Absolute...
Packt
Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Mr. Beat
Why the Principal Can Search Your Purse | New Jersey v. T. L. O.
In episode 52 of Supreme Court Briefs, two students get caught smoking in the high school restroom, and one denies it, so the principal searches her purse.
PBS
How Social Media Keeps You Poor!
Social media has become such a pervasive part of our lives, we're often not even aware of the ways it pushes us to spend more money.
Brainwaves Video Anthology
Tom Kemp - Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy
Tom Kemp is a Silicon Valley–based author, entrepreneur, investor, and policy advisor. Tom was the founder and CEO of Centrify (renamed Delinea in 2022), a leading cybersecurity cloud provider that amassed over two thousand enterprise...
Curated Video
Silent Operations of Power
Intellectual historian Quentin Skinner (QMUL), describes how government agents reading our email is actually a diminishment of our civic liberty.
Curated Video
Facial Recognition On Any Photo 😬 | PimEyes Image Search
Turns out you don't need to buy that Clearview AI subscription after all.
Curated Video
Your Identity Is NOT Private
AI can be used to re-identify individuals based on videos, images, and now anonymized data. What can you do to protect yourself, and what is the future of this technology?
Curated Video
Should Your School Track Your Online Activity? | Gaggle + Student Activity Monitoring Software
Should Your School Track Your Online Activity? | Gaggle + Student Activity Monitoring Software
Curated Video
Unintended Consequences from Technology
Unintended Consequences from Technology describes how the use of technology can have unintended consequences on society and the environment.
Curated Video
Differential Privacy + Federated Learning Explained (+ Tutorial) | #AI101
In this month's AI 101, we're learning about differential privacy and federated learning.
Curated Video
Can Federated Learning Improve Internet Privacy? | Google FLoC
Google wants to use federated learning to improve internet privacy. Will it really work?
Curated Video
Does Facial Recognition Work On Face Masks?
Now that we're all wearing masks, we don't have to worry about facial recognition anymore, right? Wrong.
Curated Video
Do Schools Spy on Students' Laptops? | Gaggle AI Student Surveillance
Do Schools Spy on Students' Laptops? | Gaggle AI Student Surveillance
Curated Video
The Lavender Scare
The Lavender Scare was a government clampdown on members of the LGBTQ+ community in the 1940s, 50s and 60s which saw gay and lesbians barred from the federal government for decades.
One Minute History
126 Roe vs Wade - One Minute History
1968 - Norma McCorvey becomes pregnant for a third time and is denied the right to an abortion in her native state of Texas. Under the pseudonym ‘Jane Roe’, McCorvey files suit against the state of Texas and district attorney Henry...
Hip Hughes History
The USA Freedom Act Explained: US History Review
My Social Studies teacher look at how the USA Freedom Act changes the USA Patriot Act. Plus you get to learn what a backronym is.