Curated Video
Exploring the Benefits of VoIP and Skype: Revolutionizing Communication
Skype is a VoIP application that allows users to make untimed and long-distance phone calls for free using an internet connection. With its peer-to-peer technology, Skype enables direct communication between users' computers, eliminating...
Curated Video
Advancements in Underwater Photography: Capturing Clearer Images
This video discusses the challenges of underwater photography and introduces a new system that aims to capture clearer and more objective images underwater. By using a special submergible camera and mathematical algorithms based on the...
Curated Video
Planet Earth: Our Home, Our Responsibility
In this video, Nova takes children on an adventure to learn about the universe of values and good manners. They explore the importance of taking care of planet Earth by conserving electricity, saving water, recycling, and reusing....
Curated Video
Transforming Old Computers: Resale, Reuse, and Giving Back
Tier One is a company in Manchester that specializes in refurbishing and repurposing old computers and accessories. They work with large corporate clients to ensure that their old IT systems are properly disposed of, either by selling...
Curated Video
The Fly Pen Computer: A Revolutionary Tool for Creative Learning
The Fly pen computer is a revolutionary device that combines the functionality of a computer with the simplicity of a pen. It allows children aged 8 to 12 to draw a calculator and do math, or create a piano keyboard and play tunes on it....
Curated Video
Virtual Interviewing: 101
As technology advances, companies turn more and more to virtual interviewing where they are able to "sit down" with a prospective hire no matter the distance. Think it's not that big of a deal to prepare specifically for a virtual...
Curated Video
Revolutionary Implant: Russian Surgeons Successfully Implant Electronic Heart Guardian for Treating Heart Malfunctions
Russian surgeons have successfully implanted a groundbreaking micro computer called the Electronic Heart Guardian, which monitors heart activity and delivers targeted electric impulses to normalize heart operation in case of...
Curated Video
Breakthrough: World's Smallest Computer Diagnoses and Fights Cancer
Researchers at the Mediterranean Institute of Science have developed the world's smallest computer, made entirely of biological molecules. This biomolecular computer can detect changes in the balance of molecules in the body, allowing it...
Curated Video
Exploring the Future of Smart Homes: The E Home Exhibition in Berlin
The E Home exhibition in Berlin showcases the latest developments in household consumer electronics, demonstrating how wireless technology and smart home systems are revolutionizing home maintenance and automation. With the ability to...
Curated Video
Revolutionary Brain Implant Allows Paralysed Man to Control Objects with Thought
In this groundbreaking video, a paralysed man named Matthew Nagle becomes the first person in the world to control objects through thought using a brain implant. By attaching electrodes to the surface of his brain, he can control...
Curated Video
The Evolution of Computer Interaction: Meet Jeremiah, the Expressive Computer Character
Jeremiah is a computer-based character with a face that can interact with people through simple expressions. Created for an art exhibition, Jeremiah's visual system tracks moving objects and changes its expression accordingly. This...
Curated Video
Transforming Education: The Hole in the Wall Project Empowering Indian Children
The Hole in the Wall Project is a unique IT experiment that has brought computer literacy to over 40,000 Indian children in just five years. By setting up computers in public places, children in urban and remote areas have been able to...
Curated Video
Java Multithreading and Parallel Programming Masterclass - What Is a Process?
This video talks about process in detail.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting Windows 10 with Bitlocker
Another encryption tool available for the Windows 10 Operating system, Bitlocker, is explored here.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Back Up Your Computer
In this video, we will look at a backup, the advantages of having a backup system in place, and how to back up your computer.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - CC Cleaner
This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Ransomware - Cryptolocker, WannaCry, Bad Rabbit
In this video, we will look at the most effective form of malware today globally, ransomware, a form of malware where the attacker prevents the victim from accessing the computer or the files.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Securing the Windows 10 Boot Process
In this video, we will look at how a rootkit can infect a system with the boot process and how this can be eliminated.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - VPN + Tor
In this video, the author addresses the question of using VPN and Tor to provide more anonymity.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacking Tor - The End-to-End Correlation Hack
This video will discuss a significant attack on Tor, the end-to-end correlation attack.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Internet Protocol Suite - TCP/IP
In this lesson, we will understand the two foundational protocols, TCP and IP, used on the Internet.