Curated Video
Introduction to Cloud Computing - Footprints of Amazon Web Services
This video explains the footprints of Amazon Web Services. This clip is from the chapter "Let's learn AWS" of the series "Introduction to Cloud Computing".This section introduces you to AWS.
Curated Video
Cyber Security Issues
This video sheds the light on some ethical issues of cyber security jobs
Curated Video
ISO 27002-2022 Control Examples
In this video, we will be exploring ISO 27002-2022 control examples. ISO 27002-2022 is a globally recognized standard for information security management systems. It provides a framework for organizations to establish, implement,...
Institute for New Economic Thinking
J. Doyne Farmer - Networks and Systemic Risks
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risks
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Categories of ML Tasks and Attacks
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to demonstrate that all approaches to solving...
Curated Video
Describe cyber attacks that could affect a computer system or network : Network Vulnerability Test Scope and Process
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Soliloquy
Common Carriers and Net Neutrality
Since its inception the internet has been built on a foundation of equality; this is a principle called Net Neutrality â but how does the concept of a common carrier relate to Net Neutrality?
Intelligence Squared
The impact of the British Empire
Niall Ferguson is speaking at the IQ2 event "Niall Ferguson on the six "killer apps" of Western civilisation. Niall Ferguson - IQ2 highlights
The Wall Street Journal
Geopolitics And Cyberattacks
Anne Neuberger, Director of the NSA's new Cybersecurity Directorate, discusses how geo-political events often drive surges in cyberattacks against the U.S. public and private sector. Are the nation's defenses up to the task of defending...
Science360
Community College Cybersecurity Program Trains 21st-Century Workforce
The stakes are high at Collegiate Cyber Defense Competitions (CCDC), where top-notch security professionals pose as computer hackers, who try to break into simulated business computer networks -- the kinds you'd find on Wall Street, in...
Curated Video
Describe network protocols : Network Layers
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will have a look at Network Layers and learn something about...
NASA
The Invisible Network: 04. Automation | NASA's The Invisible Network Podcast
In the telephone switchboard’s earliest days, the late 1800s, operators served a limited number of customers within their own communities. As telephone use expanded, automation helped switchboards keep up. NASA is working on a similar...
Brainwaves Video Anthology
Damon Centola - How Behavior Spreads: The Science of Complex Contagions
Damon Centola is a Professor of Communication, Sociology and Engineering at the University of Pennsylvania, where he is Director of the Network Dynamics Group. He is a leading world expert on social networks and behavior change. His work...
Science360
ARTIFICIAL ORGANS GO FOR A SPIN
In episode 42, Jordan and fill-in co-host Laurie talk about cotton candy machines that have been repurposed to make artificial capillary networks. The artificial capillary system the researchers were able to produce using this method...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Introduction: What are Artificial Neural Networks and how do they learn?
From the section: Artificial Neural Networks. In this section, we’ll cover Bayes Theorem, Naive Bayes, SVM and SVC to classify data. Artificial Neural Networks: Introduction: What are Artificial Neural Networks and how do they learn?
Packt
Data transmission : Physical versus logical topology
From the section: Introduction to Computer Networks (ICND1). This Section introduces Computer Networks. This includes lectures on Physical Components, Topology, Speed etc. Introduction to Computer Networks (ICND1): Physical versus...
TLDR News
GB News (a British Fox News) Launches in Spring: Is Britain Ready? - TLDR News
Up until now, the UK has managed to keep television news relatively neutral, with all the major players taking an apolitical stance. That looks to change though with GB News and News UK both set to launch this spring, becoming Britain's...
Healthcare Triage
Doctor Choice Can Be Limited with Medicare Advantage
Medicare Advantage are plans with private companies that contract with Medicare to deliver services. Some of these plans work great, but many of them have limited lists of approved providers, which can make finding a doctor difficult for...
XKA Digital
Worn boards in the public sector
Zenna Atkins currently runs ZA partners, an organisation designed to assist other organisations and companies to find creative solutions, deliver innovation and achieve their goals. Prior to this, Zenna worked in the private sector, and...
NASA
The Invisible Network: 17. Commercialization - LunaNet | NASA's The Invisible Network Podcast
NASA is fostering a commercial space economy. In this episode of "The Invisible Network" podcast, we look at how NASA's LunaNet communications architecture allows industry to participate in Artemis.
Institute for New Economic Thinking
Margaret Levenstein - Financing Innovation or Speculation, the Case of Cleveland
Did you know that around 1920 Cleveland, Ohio, had a technological cutting edge not unlike Silicon Valley today? Probably you didn't, because Cleveland lost its edge during the Great Depression, and its innovation networks were never...
Science360
Perceiving Brain - Mysteries of the Brain
Sabine Kastner, a professor of neuroscience and psychology at Princeton University, is studying how the brain determines what information is most important in everyday scenes. Using functional magnetic resonance imaging, Kastner is able...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Network Planning
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide...
XKA Digital
Support women at the early stage of their careers
Keily is an award-winning Director in PwC's Commercial Litigation and Regulatory Disputes team. Prior to joining PwC in January 2017, Keily was a senior associate in the Litigation Group of Morrison & Foerster's London office. There she...