Brainwaves Video Anthology
Will Richardson - Personal Learning Networks
Will Richardson is a parent, educator, speaker, author, and blogger. Will is trying to answer the question, "What happens to schools and classrooms and learning in a 2.0 world?"
Curated Video
CISSP®- Business Continuity Planning - Part 1
This is the first part of a two-part video that explains business continuity planning. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Curated Video
routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Exam Question Review
Penetration testing provides insight as to how secure an organization's physical and IT infrastructure really is. In this episode, a pen testing scenario is provided. This clip is from the chapter "Testing Infrastructure" of the series...
Science360
What do we know about how people recognize faces?
What do we know about how people recognize faces? Catherine Stamoulis, assistant professor of pediatrics at Harvard Medical School, answers the question on this edition of "Ask a Scientist."
Intelligence Squared
Niall Ferguson on Facebook's role in the rise of Donald Trump
Niall Ferguson on Facebook's role in the rise of Donald Trump.
Healthcare Triage
Narrow Insurance Networks Limit Access, Especially for Kids
Narrow health insurance networks cover fewer doctors, and can be especially narrow when it comes to specialists. And, it turns out, this limited access to specialists disproportionately affects children. This is Healthcare Triage News.
Curated Video
routing protocols : Terms: AS, IGPs, EGPs
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Terms: AS, IGPs, EGPs
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 8
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
The Wall Street Journal
Upgrade Time
Ajit Pai, chairman of the Federal Communications Commission, shares his views on the the global 5G race, the greatest threats to the Internet and the outlook for deals at WSJ Tech Live in Laguna Beach.
IDG TECHtalk
Coronavirus, working from home and your home Wi-Fi network
Due to concerns around the coronavirus and COVID-19, you might be working from home. We are, too! On today’s first remote episode of Today in Tech, Juliet discusses if your home Wi-Fi network will be able to handle a huge spike in...
Australian Broadcasting Corporation
Migrant Women in Business
Movin' to the Country is a series that celebrates the entrepreneurs, innovators and dreamers transforming Australia's beautiful regional areas in surprising new ways. Luz immigrated to Australia from Columbia and quickly realized that...
XKA Digital
Fostering an intrepreneurial spirit
Over the last two decades Alex has been a senior specialist change consultant within the media industry at the BBC, in local government at Kent County Council, and most recently in IT professional services at Capita and Capgemini. Having...
IDG TECHtalk
Boeing's insecure networks threaten security and safety
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?
You will learn how hard it has become to hack into systems and company networks these days. This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training Course".This...
Curated Video
World of Computer Networking Your CCNA start - Introduction "What is a Computer Network?"
This video provides an introduction to the course. This clip is from the chapter "What is a Computer Network?" of the series "World of Computer Networking: Your CCNA start".This section introduces you to the concept of computer networks...
Brainwaves Video Anthology
Damon Centola - Change: How to Make Big Things Happen
Damon Centola is a Professor of Communication, Sociology and Engineering at the University of Pennsylvania, where he is Director of the Network Dynamics Group. He is a leading world expert on social networks and behavior change. His work...
Institute for New Economic Thinking
Frank Kelly - Networks and Systemic Risk
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risk
IDG TECHtalk
How attackers exploit the COVID crisis to compromise your network
Targeted phishing attempts and updated malware are creating havoc for Windows admins in a hard time. Here are some tips to minimize the damage.
Packt
List computer networking media : Virtual Private Networks (VPNs)
From the section: The Internet. Here, we explore our internet options. In this episode, Mike shows how virtual private networking (VPN) works and why people use VPN connections. He discusses the types of protocols and clients that make...
Institute for New Economic Thinking
Can Networks Reduce Competition?
Prof. Sanjeev Goyal explains his general theory of network formation based on individual incentives, and their economic implications
Curated Video
SIM Cards: the Key to Your Phone's Functionality
A SIM card is a type of ID card for your phone. It tells your phone which network to connect to and which messages and phone calls to receive. Learn about the convenience and functionality of SIM cards.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Keylogger Demo
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network. This clip is...
Curated Video
routing protocols : Classful routing protocols
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Classful routing protocols