Instructional Video14:13
Brainwaves Video Anthology

Will Richardson - Personal Learning Networks

Higher Ed
Will Richardson is a parent, educator, speaker, author, and blogger. Will is trying to answer the question, "What happens to schools and classrooms and learning in a 2.0 world?"
Instructional Video1:19
Curated Video

CISSP®- Business Continuity Planning - Part 1

Higher Ed
This is the first part of a two-part video that explains business continuity planning. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video7:11
Curated Video

routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
Instructional Video1:49
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 12 Exam Question Review

Higher Ed
Penetration testing provides insight as to how secure an organization's physical and IT infrastructure really is. In this episode, a pen testing scenario is provided. This clip is from the chapter "Testing Infrastructure" of the series...
Instructional Video2:21
Science360

What do we know about how people recognize faces?

12th - Higher Ed
What do we know about how people recognize faces? Catherine Stamoulis, assistant professor of pediatrics at Harvard Medical School, answers the question on this edition of "Ask a Scientist."
Instructional Video2:13
Intelligence Squared

Niall Ferguson on Facebook's role in the rise of Donald Trump

Higher Ed
Niall Ferguson on Facebook's role in the rise of Donald Trump.
Instructional Video4:13
Healthcare Triage

Narrow Insurance Networks Limit Access, Especially for Kids

Higher Ed
Narrow health insurance networks cover fewer doctors, and can be especially narrow when it comes to specialists. And, it turns out, this limited access to specialists disproportionately affects children. This is Healthcare Triage News.
Instructional Video4:21
Curated Video

routing protocols : Terms: AS, IGPs, EGPs

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Terms: AS, IGPs, EGPs
Instructional Video14:04
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 8

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Instructional Video26:38
The Wall Street Journal

Upgrade Time

Higher Ed
Ajit Pai, chairman of the Federal Communications Commission, shares his views on the the global 5G race, the greatest threats to the Internet and the outlook for deals at WSJ Tech Live in Laguna Beach.
Instructional Video3:13
IDG TECHtalk

Coronavirus, working from home and your home Wi-Fi network

Higher Ed
Due to concerns around the coronavirus and COVID-19, you might be working from home. We are, too! On today’s first remote episode of Today in Tech, Juliet discusses if your home Wi-Fi network will be able to handle a huge spike in...
Instructional Video5:05
Australian Broadcasting Corporation

Migrant Women in Business

9th - 12th
Movin' to the Country is a series that celebrates the entrepreneurs, innovators and dreamers transforming Australia's beautiful regional areas in surprising new ways. Luz immigrated to Australia from Columbia and quickly realized that...
Instructional Video2:11
XKA Digital

Fostering an intrepreneurial spirit

Higher Ed
Over the last two decades Alex has been a senior specialist change consultant within the media industry at the BBC, in local government at Kent County Council, and most recently in IT professional services at Capita and Capgemini. Having...
Instructional Video14:51
IDG TECHtalk

Boeing's insecure networks threaten security and safety

Higher Ed
Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup reveals...
Instructional Video2:38
Curated Video

The Beginners 2022 Cyber Security Awareness Training Course - How Hard Is it to Get Hacked?

Higher Ed
You will learn how hard it has become to hack into systems and company networks these days. This clip is from the chapter "How Hard Is it to Get Hacked?" of the series "The Beginners 2022 Cyber Security Awareness Training Course".This...
Instructional Video3:10
Curated Video

World of Computer Networking Your CCNA start - Introduction "What is a Computer Network?"

Higher Ed
This video provides an introduction to the course. This clip is from the chapter "What is a Computer Network?" of the series "World of Computer Networking: Your CCNA start".This section introduces you to the concept of computer networks...
Instructional Video3:06
Brainwaves Video Anthology

Damon Centola - Change: How to Make Big Things Happen

Higher Ed
Damon Centola is a Professor of Communication, Sociology and Engineering at the University of Pennsylvania, where he is Director of the Network Dynamics Group. He is a leading world expert on social networks and behavior change. His work...
Instructional Video16:43
Institute for New Economic Thinking

Frank Kelly - Networks and Systemic Risk

Higher Ed
The Inaugural Conference @ King's, Institute for New Economic Thinking, Day 2 - Lunch: Networks and Systemic Risk
Instructional Video6:00
IDG TECHtalk

How attackers exploit the COVID crisis to compromise your network

Higher Ed
Targeted phishing attempts and updated malware are creating havoc for Windows admins in a hard time. Here are some tips to minimize the damage.
Instructional Video7:59
Packt

List computer networking media : Virtual Private Networks (VPNs)

Higher Ed
From the section: The Internet. Here, we explore our internet options. In this episode, Mike shows how virtual private networking (VPN) works and why people use VPN connections. He discusses the types of protocols and clients that make...
Instructional Video1:23
Institute for New Economic Thinking

Can Networks Reduce Competition?

Higher Ed
Prof. Sanjeev Goyal explains his general theory of network formation based on individual incentives, and their economic implications
Instructional Video3:00
Curated Video

SIM Cards: the Key to Your Phone's Functionality

Pre-K - Higher Ed
A SIM card is a type of ID card for your phone. It tells your phone which network to connect to and which messages and phone calls to receive. Learn about the convenience and functionality of SIM cards.
Instructional Video4:45
Curated Video

CompTIA Security+ Certification SY0-601: The Total Course - Keylogger Demo

Higher Ed
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network. This clip is...
Instructional Video2:52
Curated Video

routing protocols : Classful routing protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Classful routing protocols