Instructional Video2:25
SciShow

How Do Chips Make Credit Cards More Secure?

12th - Higher Ed
If you live in the United States, you might have recently gotten a credit card with a microchip on it. But what does this chip do that makes it any different than the magnetic strip on the back of the card?
Instructional Video5:20
Let's Tute

Use of Technology in Securities Market

9th - Higher Ed
In this Video we are going to know the what are the use of technology in security markets. In this session we are going to explain how technology transmorning the secutrities market? and Do's and Don'ts to prevent the potential risks .
Instructional Video7:39
Let's Tute

Role of RBI and Banks

9th - Higher Ed
In this session we will understand the role of reserve bank of India (RBI)and Role of banking in nation building. In the role of RBI as a regulator of the bank are i) Licensing and Autherization ii) Prudential regulations iii)...
Instructional Video4:48
Let's Tute

3-in-1 Account - banking, trading and demat

9th - Higher Ed
In this Video you will learn what is the 3 in 1 Account. and the use of technology with Do's and Don'ts. In the 3-in-1 Account total three account that is Demat Account , Savings Account and Trading Account. What are the do's and Dont's...
Instructional Video4:27
Curated Video

Landmarks - Tigris River

12th - Higher Ed
TIGRIS RIVER IN BIBLICAL TIMES THE TIGRIS RIVER WAS BELIEVED TO HAVE BEEN ONE OF THE FOUR RIVERS TO HAVE FLOWED FROM THE GARDEN OF EDEN. THE FAST FLOWING RIVER ALONG WITH IT SLOWER SISTER RIVER, THE EUPHRATES, FLOWS FROM THE MOUNTAINS OF...
Instructional Video3:14
Curated Video

Enhancing Olympic Security: The Role of Satellite Navigation Technology

Pre-K - Higher Ed
This video highlights the use of advanced satellite navigation technology in ensuring the safety and security of the Olympic Games in Athens. The applications showcased demonstrate how precision positioning and real-time multimedia...
Instructional Video1:13
Curated Video

Info Security Europe: Cybersecurity for Business Systems and Domestic Users

Pre-K - Higher Ed
Info Security Europe is a trade fair showcasing the latest in cybersecurity for businesses of all sizes. The event highlights the importance of computer security for organizations like the McLaren Formula One team, ensuring sensitive...
Instructional Video3:03
Curated Video

nhancing Race Team Performance with Microsoft Tablet PCs and Centel Software

Pre-K - Higher Ed
This video highlights how a US race team, TCGR, is using Microsoft Tablet PCs with Centel software to enhance communication and data sharing between pit crews and engineering staff. The system allows for instant messaging, secure...
Instructional Video1:23
Curated Video

Wi-Fi Security: The Risks of Hacking and Freeloading

Pre-K - Higher Ed
In this video, the speaker highlights the ease with which people can tap into someone's wireless computer network without paying for it, emphasizing the lack of security measures taken by many Wi-Fi users. They explain the risks...
Instructional Video5:15
Curated Video

Struggle to Sustain the Halibut Population in the Bering Sea

3rd - Higher Ed
St. Paul Island, a small fishing community in the Bering Sea, relies heavily on halibut stocks, is struggling as fish trawlers damage the halibut supply. As these industrial boats trawl for various types of fish, they often unintentially...
Instructional Video4:21
Curated Video

Landmarks - House of The Future

12th - Higher Ed
HOUSE OF THE FUTURE THIS IS THE HOUSE OF THE FUTURE OR AT LEAST ONE VERSION OF IT - ON DISPLAY AT THE BELGIUM LIVING TOMORROW CONVENTION. 80 PERCENT OF THE TECHNOLOGY IN THIS HOUSE IS ALREADY ON THE MARKET, THE REST IS NOT FAR AWAY. AS...
Instructional Video2:15
Curated Video

High-Tech Security: Aerial Surveillance with the Helium-Filled Airship

Pre-K - Higher Ed
This video showcases a 60-meter helium-filled airship called Foibos, which was used during the 2004 Olympics in Athens for high-tech security purposes. Equipped with dome-shaped sensors, chemical sniffers, ultra-high-resolution cameras,...
Instructional Video3:30
Curated Video

GMES: Advancing Global Monitoring for Environment and Security

Pre-K - Higher Ed
The Group on Earth Observation is overseeing a 10-year plan to coordinate data gathered on the environment from satellites and terrestrial sources. Europe's Global Monitoring for Environment and Security system (GMES) is at the forefront...
Instructional Video7:52
Curated Video

How to Define Team Ground Rules

10th - Higher Ed
Ground rules… What are they, does your project team need them, and how to set and maintain them if it does? That’s what we’ll look at in this video. What are Ground Rules Ground rules set out a code of conduct for a team. They explain...
Instructional Video8:01
Curated Video

What is the Blockchain?

10th - Higher Ed
Blockchain is a technology for recording transactions. And, since its first use in 2008 for cryptocurrency, it is emerging as one of the must-have technologies in many industry sectors. Project managers will often be called upon to...
Instructional Video3:46
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Peer Updates

Higher Ed
This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.
Instructional Video4:25
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates

Higher Ed
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Instructional Video4:15
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email

Higher Ed
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.
Instructional Video6:04
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Email Basics, Protocols and Ports

Higher Ed
In this lesson, you will learn about emails, what protocols and ports they use to communicate, the IMAP port 143 and POP port 110, IMAP port 993 and POP port 995, encrypted and unencrypted.
Instructional Video6:45
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN Myths Debunked

Higher Ed
In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.
Instructional Video7:13
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - NordVPN

Higher Ed
In this video, the author illustrates more about NordVPN and the benefits and cons of the VPN.
Instructional Video6:20
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Types of VPNs

Higher Ed
In this video, the author discusses the various kinds of VPNs used and the benefits and disadvantages of the VPNs
Instructional Video7:15
Curated Video

Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introduction to Proxy Servers

Higher Ed
Let's discuss the first anonymizer, the proxy server, and how it can provide a proxy IP address to hide your activity.
Instructional Video6:14
Curated Video

Practical Cyber Hacking Skills for Beginners - Introduction to NAT

Higher Ed
This video is a detailed introduction to Network Address Translation, allowing computers to share the same public IP address.