Hi, what do you want to do?
Curated Video
Risk Concept
A general definition of risk, risk refers to the chance that an investment's actual return will differ from what is expected
National Institute of Standards and Technology
Key to Security: Biometric Standards
NIST develops and tests biometrics (e.g., fingerprint, face, iris, & multimodal) standards and technology that promote security, interoperability, and innovation. Four projects (in collaboration with the DHS and the FBI) are...
Curated Video
Detection and Identification of Plant Diseases
In this lecture video, the speaker discusses the detection and identification of plant diseases. They explain how to detect signs of diseases in plants, such as stunted growth, spots on leaves, and discoloration, and how to identify...
Science360
Biometrics - Science of Innovation
A method for capturing and analyzing the vein patterns in the white part of the eye to help identify people. Biometrics has potential applications for driver's licenses, passports or computer identification control.
Provided...
Provided...
Science360
Computer scientist sees new possibilities for ocular biometrics
While many of us rely on passwords to protect our identity, there's more sophisticated identity recognition technology called biometrics that we could use. Security measures that use biometrics rely on a person's unique characteristics...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Identification, Authentication, and Authorization
Authorization to access resources occurs after the successful proving of one's identity through authentication. This clip is from the chapter "Identity and Account Management" of the series "CompTIA Security+ Certification SY0-601: The...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Response and Mitigation, Risk and Control Monitoring, and Control Reporting
This video explains the concepts of risk response and mitigation; risk and control monitoring; and finally, risk and control reporting.
r/>
This clip is from the chapter "Certified Information Systems Security Professional...
r/>
This clip is from the chapter "Certified Information Systems Security Professional...
TMW Media
Tarantula World: Determining a Name for a New Tarantula Species
How do scientists determine a new species of tarantula? How are the tarantulas scanned?<br/>
Tarantula World, Part 7
Tarantula World, Part 7
Neuro Transmissions
The Science Behind Jedi Mind Tricks
These aren't the droids you're looking for. But it is the video you're looking for! Jedi mind tricks are one of the most interesting incarnations of the Force. They seem almost magical. However, in this video, we see that Jedi mind...
Next Animation Studio
Remote ID system proposed for drones in U.S. airspace
The Federal Aviation Administration has proposed using remote identification for unmanned aircraft systems in the U.S.
<br/>
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Enabling Multifactor Authentication
Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have.
r/>
This clip is from the chapter "Identity...
r/>
This clip is from the chapter "Identity...
Seven Dimensions
Office Security: Lessons Learned from a Theft
In this video, an employee addresses a theft that occurred in their office and emphasizes the importance of security. They propose implementing stricter measures, such as ID checks and security lists, to ensure that only authorized...
APMonitor
LSTM Replaces SISO MPC
The purpose of this exercise is to automate a temperature control process with an LSTM network. The LSTM network is trained from a Model Predictive Controller (MPC). LSTM (Long Short Term Memory) networks are a special type of RNN...
Blockchain Central
Why Criminals Love Monero?
This week on Blockchain Central: we’ll take a closer look at Monero, a cryptocurrency which has one of the best security systems among others and has a potential to become your personal bank. However, it still has downsides, which we...
Communication Coach Alex Lyon
Referent Power
Referent Power (French & Raven) is one of the types or bases of power. We look at examples of referent power.
Referent power, according to French and Raven (1959), is social influence. Referent power describes the way a follower...
Referent power, according to French and Raven (1959), is social influence. Referent power describes the way a follower...
Next Animation Studio
MasterCard pushes for commuter biometrics at public transit systems
CCTV and gait analysis may come to US public transit to allow commuters to pay without using cards or passes.
<br/>
TMW Media
Tarantula World: How to Save Tarantulas from Humans
Two doctors search the desert of Australia for unknown species of tarantulas. Why is it important to find these unknown species?
Curated Video
CISSP®- Risk Management - Identification
This video discusses how to identify and manage risks.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Curated Video
CISSP®- IAAA - Part 1- Identification, Authentication, Authorization, and Accountability
This is the first part of a two-part video that explains the concept of IAAA.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Curated Video
Learning D3.JS 5.0 3.5: Creating Clip Paths
In this video, we will learn how to create clip paths. • Write a text path and • Write the and the • Connect everything and view the result
Next Animation Studio
China’s latest Taiwan mass incursion reveals worrying capability
The Chinese Communist Party’s cold war against Taiwan just got one step closer to going hot.
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - IAAA - Part 2 - Identification, Authentication, Authorization, and Accountability
This is the second part of a two-part video that explains the concept of IAAA.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Curated Video
CISSP®- IAAA - Part 2 - Identification, Authentication, Authorization, and Accountability
This is the second part of a two-part video that explains the concept of IAAA.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...