Curated Video
AWS Certified Solutions Architect Associate (SAA-C03) - Data Security Policies
It would be remiss to discuss database design without addressing policies. We discussed security in general earlier and now will explain why policies are important.
Curated Video
CompTIA A+ Certification Core 2 (220-1102) - Windows Settings
Windows Settings has several options to change, update, and customize the OS. You can find settings for systems, devices, networks and internet, accounts, gaming, and more. This clip is from the chapter "Working with Operating Systems"...
Curated Video
The Digital Divide: Navigating Modern Technologies
Explore the impact of digital tools like smartphones, credit cards, and the internet through a challenge between Pierre, who uses traditional methods, and Christian, who uses digital solutions, to complete everyday tasks in Paris. This...
Curated Video
The Pervasiveness of Video Surveillance: Insights from Nice, the "Camera City"
Explore how the city of Nice has earned the nickname "Camera City" through its extensive network of surveillance cameras aimed at improving public safety. This report delves into the high-tech control center where the footage from 937...
Curated Video
ASP.NET 6.0 - Build Hands-On Web Projects - Controllers Folder
This video discusses the Controller folder and its content (HomeController) when the project was created with the default Model-View-Controller project template. This clip is from the chapter "Coding Project Part 2: Consume the Web API...
Curated Video
CISSP Crash Course - Compliance, Legal, and Regulations
This video explains compliance, legal, and regulations in domain 1. This clip is from the chapter "Security and Risk Management" of the series "CISSP Crash Course".This section explains domain 1, which focuses on security and risk...
Seven Dimensions
Give Bad News Effectively
Learn why it is important to deliver bad news effectively; Give bad news privately and personally; Be clear, succinct and honest; Be caring, supportive and willing to answer questions:
Curated Video
What is Remarketing? (or Retargeting)
Have you ever been wandering about the internet and been surprised to find adverts for products you recently looked at? If you have, welcome to remarketing. Maybe you looked at an online product and then, later that day, saw a discount...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Virtual Private Networks and Why You Need One
This video talks about one of the most important security tools that you can have installed on your mobile device, which is known as VPN or Virtual Private Network. This is one of the best security tools because it can provide you with...
Curated Video
The Absolute Beginners 2023 Guide to Cybersecurity - Part 3 - Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Packt
Checking Default App Permissions - IOS
This video talks about the kinds of permissions the applications have on an iOS device and how to reset the permission on an iOS device. This clip is from the chapter "Understanding Applications" of the series "The Absolute Beginners...
Mr. Beat
Why the Principal Can Search Your Purse | New Jersey v. T. L. O.
In episode 52 of Supreme Court Briefs, two students get caught smoking in the high school restroom, and one denies it, so the principal searches her purse.
PBS
How Social Media Keeps You Poor!
Social media has become such a pervasive part of our lives, we're often not even aware of the ways it pushes us to spend more money.
Brainwaves Video Anthology
Tom Kemp - Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy
Tom Kemp is a Silicon Valley–based author, entrepreneur, investor, and policy advisor. Tom was the founder and CEO of Centrify (renamed Delinea in 2022), a leading cybersecurity cloud provider that amassed over two thousand enterprise...
Curated Video
Silent Operations of Power
Intellectual historian Quentin Skinner (QMUL), describes how government agents reading our email is actually a diminishment of our civic liberty.
Curated Video
Facial Recognition On Any Photo 😬 | PimEyes Image Search
Turns out you don't need to buy that Clearview AI subscription after all.
Curated Video
Your Identity Is NOT Private
AI can be used to re-identify individuals based on videos, images, and now anonymized data. What can you do to protect yourself, and what is the future of this technology?
Curated Video
Should Your School Track Your Online Activity? | Gaggle + Student Activity Monitoring Software
Should Your School Track Your Online Activity? | Gaggle + Student Activity Monitoring Software
Curated Video
Unintended Consequences from Technology
Unintended Consequences from Technology describes how the use of technology can have unintended consequences on society and the environment.
Curated Video
Differential Privacy + Federated Learning Explained (+ Tutorial) | #AI101
In this month's AI 101, we're learning about differential privacy and federated learning.
Curated Video
Can Federated Learning Improve Internet Privacy? | Google FLoC
Google wants to use federated learning to improve internet privacy. Will it really work?
Curated Video
Does Facial Recognition Work On Face Masks?
Now that we're all wearing masks, we don't have to worry about facial recognition anymore, right? Wrong.
Curated Video
Do Schools Spy on Students' Laptops? | Gaggle AI Student Surveillance
Do Schools Spy on Students' Laptops? | Gaggle AI Student Surveillance