XKA Digital
Strive to make your own products redundant
Julian has spent his entire working career working in information technology and turning ideas into software services or businesses at Apple, AT&T Unisource, the UK Government and as the founder of his own Internet software companies....
Mediacorp
Uncovering the Dark Side of Misinformation in Indonesia
This video highlights the consequences of fake news in Indonesia, where it has led to violence, conflicts, and the spread of hate speech. The video also showcases the role of tech idealists in using technology for good and promoting...
Curated Video
Describe network protocols : Network Layers
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will have a look at Network Layers and learn something about...
Mediacorp
The Rise of Social Media Preachers in Indonesia
This video explores the phenomenon of social media influencers in Indonesia, specifically focusing on religious preachers like Felix Sierra who have gained millions of followers online. It examines the impact of these influencers on the...
The Wall Street Journal
Kimberly Bryant and Jessica Rosenworcel on The Digital Divide
At WSJ Tech Live, Kimberly Bryant and Jessica Rosenworcel discuss how the government and privacy sector should work to bridge the digital divide.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Connecting to Dedicated and Mobile Systems
There are many modern wireless communication standards. This episode discussed the Global Positioning System (GPS), 4G and 5G cellular, Wi-Fi Direct, and mobile device tethering. This clip is from the chapter "Securing Dedicated Systems"...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud
Cloud security is generally split between the Cloud Service Provider (CSP) and the cloud tenant, depending on which type of cloud service is being used. Security solutions include firewalls, data loss prevention tools as well as a Cloud...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy-Segment 2
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Curated Video
The Founder of LIDS Discusses His Entrepreneurial Journey
This video is an interview with entrepreneur Ben Fischman, who shares insights and experiences about his journey in starting and growing successful businesses. From starting Lids as a junior in college, to selling his online shopping...
Curated Video
Learning D3.JS 5.0 1.2: What Is Data Visualization?
In this video, we will learn what data visualization is, visual perception, and also what makes a good visualization. • Understand the definition of data visualization • Discuss visual perception • Learn the steps to make a great...
AllTime 10s
10 Most Dangerous Places On The Internet
The Internet is a dark place, with scams, predators and viruses lurking everywhere. So which sites are the most dangerous? Alltime 10s investigates'
Science360
Internet of Things privacy app shows IoT tech around you and what data they're collecting
New infrastructure will enhance privacy in today’s Internet of Things https://cylab.cmu.edu/news/2020/02/19-privacy-assistant.html Internet of Things (IoT) Portal: https://www.iotprivacy.io/login IoT Assistant app is available in both...
Curated Video
Present Continuous: Actions and Descriptions
In this video, the speaker discusses various actions and activities happening in different situations. They talk about people working, walking, using technology, and even discussing body language and appearance. The video provides...
Mediacorp
Using Technology in Indonesia to Protect Indigenous Land Rights
This video highlights the use of technology, specifically drones, to help indigenous communities protect their native rights and reclaim their lands from powerful resource companies. It showcases the impact of technology in empowering...
Mediacorp
Rush Hour and Technology in Indonesia
This video explores how technology, particularly mobile apps, has become an integral part of life in Indonesia. It highlights the ways in which these apps solve problems, such as ordering food and services while stuck in traffic, and how...
Curated Video
When thoughts control machines
Efforts to connect human brains to computers have taken big leaps forward in recent years. Melding our minds with machines could provide the biggest single upgrade to human intelligence since our species evolved. But are we ready?
Bill Carmody
The Future of E-commerce
In this video, Bill Carmody interviews Brent Bellm, the Chairman and CEO of BigCommerce. They discuss Brent's background in commerce and his journey to BigCommerce. They also talk about the future of commerce, including the rise of...
Practical Ninjas
Isolating Radiations | Learn under 10 min | Filters, Monochromators & Gratings | AI 02
Title: AI. Filters, Monochromators and Gratings --------------------------------------------------------------------------- This video covers the procedure to obtain a monochromatic light. The monochromatic light is a light beam...
Globalive Media
Beyond Innovation: Episode 14
Researchers send smells over the Internet, a startup brings the eBay model to the trucking industry and a flying car comes closer to becoming a reality. Plus, famous geneticist George Church explains why he’s willing to pay you to...
Brainwaves Video Anthology
Troy Campbell - The Power of Going Slow
Troy Campbell is an expert in consumer behavior, marketing social psychology, political psychology, and scientific communication. At the University of Oregon, he is an assistant professor of marketing in the Lundquist College of...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 3 Exam Question Review "Identity and Account Management"
There are a variety of ways in which user authentication can be implemented prior to allowing user access to the Internet. This question presents a scenario require user sign-off to a term of agreement before gaining Internet access....
Blockchain Central
How Bitcoin Fuels the Dark Web | Blockchain Central
This week on Blockchain Central: we will dive into the darkest part of the Internet - the dark web. Without any laws that would control the ecosystem, dark web is the perfect marketplace for illegal goods with Bitcoin as its main...
Curated Video
UX Design for Web Developers (Video 13)
User experience (UX) design is a theoretical understanding of how users interact with websites. The major challenge developers building a company website face is finding the right balance that fulfills the objectives of the company as...