Hi, what do you want to do?
Science360
Geo-Immersion Makes Maps Come Alive
Imagine a virtual computer simulation that reflects the world around you in real-time. Before you ever leave your home, a wealth of images and information about the world around you is at your finger-tips. Facial recognition might give...
Communication Coach Alex Lyon
Informational Power
Informational Power (French & Raven) is one of the types or bases of power. We look at examples of informational power.
Informational Power or Influence happens when a leader provides information, reasons, and explanations that...
Informational Power or Influence happens when a leader provides information, reasons, and explanations that...
Next Animation Studio
Drones aid wildlife conservation and fight poaching
Pilotless drone aircraft will be used to track wildlife and fight poachers in wildlife reserves around the world. Park rangers in Kenya plan to introduce drones to help monitor endangered animals over vast expanses of park land. The...
Curated Video
How AI Predicted the Coronavirus Outbreak
Jordan explains how algorithms can be used to predict and monitor disease outbreaks, including in the case of the 2020 Coronavirus, or COVID-19, outbreak.
Seven Dimensions
Proactive Measures for Workplace Security and Safety
In this video, the speaker emphasizes the importance of being proactive rather than reactive when it comes to workplace security and safety. The video emphasizes the long-term impact of workplace incidents and the benefits of proactive...
The Wall Street Journal
Expanding Global Access to Covid-19 Vaccines
Partners in Health CEO Sheila Davis and Tulio de Oliveira, director of the Centre for Epidemic Response and Innovation at Stellenbosch University, discuss global vaccine distribution and what should be done now to prepare for the next...
Curated Video
Are You Being Spied On?
Should the US government be allowed to spy on its citizens to protect society as a whole? There are arguments for and against – but the Big Brother state isn't a conspiracy theory, it's real!
Healthcare Triage
COVID-19 Surveillance and the Difficulty of Contact Tracing
We definitely need to be tracing the contacts of people who have tested positive for coronavirus, so that we can know who else has been exposed. This is a herculean task, but we have to do it. And there are some ideas and practices that...
The Art Assignment
Stakeout! - Responses | The Art Assignment
In which we feature responses to The Art Assignment Ep. 2: Stakeout!, given by Chicago-based artist Deb Sokolow.
Seven Dimensions
Principles and Protocols for Protecting Personal Items and Preventing Theft
Colin McLaren and Eve Ash discuss what people should do to protect their personal property and company assets. The video highlights the need for vigilance and proactive management in maintaining a safe work environment.
Next Animation Studio
Researchers develop remote-controlled cockroaches
Researchers at North Carolina State University have designed a technique that can remotely control cockroaches. In a paper titled Line Following Terrestrial Insect Biobots, doctoral student Tahmid Latif and Alper Bozkurt, assistant...
Seven Dimensions
Protecting Organizations: Preventing Crime and Violence at Work
In this video, Colin McLaren, an expert in crime prevention, discusses the importance of proactive measures to protect organizations from crime and violence in the workplace. He emphasizes the need for strong policies and procedures, as...
Institute for New Economic Thinking
Don't Be Evil. Rana Foroohar on Big Tech.
INET President Rob Johnson talks with the Financial Times’ Rana Foroohar about her new book, Don’t Be Evil: How Big Tech Betrayed It’s Founding Principles—And All Of Us (Currency, 2019).<br/>
Healthcare Triage
Lessons from Singapore and Reopening The United States
Singapore had one of the world's most robust and effective responses to coronavirus and COVID19. Despite that, the country still had to enter lockdown and struggled to control the spread of the disease. What can this tell us about how...
History Hit
George Orwell's 1984 with Dorian Lynskey: The origins and reception of 1984
What were the origins of 1984? How much is 1984 about surveillance technology? What was the reception of 1984 at the time?<br/>
George Orwell's 1984 with Dorian Lynskey Part 2
George Orwell's 1984 with Dorian Lynskey Part 2
The Wall Street Journal
When Tech Meets the Surveillance State
Human Rights Watch's Sophie Richardson discusses the dark side of China's use of cutting-edge surveillance technology with WSJ Editor Josh Chin.
Healthcare Triage
Lawsuits as a Tool to Stifle Research
Health research is difficult for a bunch of reasons. One of those reasons is the practice of using lawsuits to stifle research. A researcher finds that a product is harmful, and the producers of that product attack the researcher in...
Next Animation Studio
Russian spacecraft shadowing U.S. spy satellite: U.S. Space Force commander
Two mysterious Russian spacecraft have been shadowing a U.S. reconnaissance satellite since November, coming to as close to 100 miles at times.
<br/>
Seven Dimensions
Securing Your Business: Protecting Premises and Preventing Theft
This video discusses the vulnerabilities of business premises and provides practical tips on fortifying and securing the property. It emphasizes the importance of location, proper lighting, signage, cameras, locks, and employee safety...
Next Animation Studio
Venezuela's smart ID card created with the help of China's ZTE
A Reuters report has uncovered how Chinese telecom giant ZTE is helping Venezuela build a system to monitor its citizens.
Next Animation Studio
Sonic Attacks' in China could just be ultrasonic surveillance
Alleged cases of "sonic attacks" in China and Cuba has raised the question of how sound can used as a weapon.
ShortCutsTv
Childhood and New Technology
This film explores some of the ways new communication technologies, such as mobile phones and surveillance software, impact on concepts of children and childhood in contemoprary societies.
Next Animation Studio
FBI tricked international cartels into using ‘encrypted’ phones
The huge surveillance operation started years ago, when a convicted drug smuggler offered the ‘back door’ of his special new gangster phone to the FBI.