Computer Science and Technology

Most Popular

Most Recently Added

Social Media

Video Gaming

Google, Facebook & Co.

Cybercrime

Big Data

Robotics

Loading more films...

275 Videos in Computer Science and Technology

Loading...

GTFO - Get the F**k Out - Women in Gaming
Sparked by a public display of sexual harassment in 2012, GTFO pries open the video game world to explore a 20 billion dollar industry that is riddled with discrimination and misogyny. Although half of all gamers are women, females are…
Generation Like
Part of the Series: Frontline
PBS
Thanks to social media, today's teens are able to directly interact with their culture--artists, celebrities, movies, brands, and even one another--in ways never before possible. But is that real empowerment? Or do marketers still hold the upper hand? In Generation…
The Future of Work and Death - The Impact of Technological Advances on Human Life
'What is humanity?' In this revealing documentary, world experts in the fields of Futurology, Anthropology, Neuroscience, and Philosophy consider the impact of technological advances on the two certainties of human life; Work and Death. Charting human developments from Homo Habilis,…
Joystick Warriors - Video Games, Violence & the Culture of Militarism
For years, there has been widespread speculation, but very little consensus, about the relationship between violent video games and violence in the real world. Joystick Warriors provides the clearest account yet of the latest research on this issue. Drawing on…
Google and the World Brain
In 1937, the science fiction writer H. G. Wells imagined a "World Brain" containing all of the world's knowledge, accessible to all people, that would be "so compact in its material form and so gigantic in its scope and possible…
2 videos
Game Over - Gender, Race & Violence in Video Games
Video and computer games represent a $6 billion a year industry. One out of every ten households in American owns a Sony Playstation. Children who own video game equipment play an average of ten hours per week. And yet, despite…
Cyber Fraud, Theft, and Organized Crime
Episode 6 of Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare Series
Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the…
Silicon Valley
Part of the Series: American Experience
PBS
In 1957, decades before Steve Jobs dreamed up Apple or Mark Zuckerberg created Facebook, a group of eight brilliant young men defected from the Shockley Semiconductor Company in order to start their own transistor business. Their leader was 29-year-old Robert…
Artificial Intelligence
Episode 34 of Redefining Reality
Trace the evolution of artificial intelligence (AI) from simple calculating machines to computers that can vanquish chess masters. Learn the distinction between weak AI, such as a chess-playing machine, and strong AI, which is a machine that has a truly…
Silicon Run I
Silicon Run I uses live industrial footage to show the many processes necessary to manufacture microchips, including crystal growth, circuit design, and the wafer fabrication process for CMOS technology. Using close-ups of manufacturing processes and device animation, Silicon Run I…
Effective Data Management
How much data do we create every day? Well, experts estimate that a massive 2.5 quintillion bytes of data is amassed on a daily basis and that 90% of the world's global data glut is the product of only the…
State of Play: The World of South-Korean Professional Video Gamers
"Man only plays when in the full meaning of the word he is a man, and he is only completely a man when he plays." -- Friedrich Schiller Globally, thousands of teenagers are seriously contemplating a professional career as a…
Returning Fire - Interventions in Video Game Culture
Interventions in Video Game Culture Video games like Modern Warfare, America's Army, Medal of Honor, and Battlefield are part of an exploding market of war games whose revenues now far outpace even the biggest Hollywood blockbusters. The sophistication of these…
2 videos
Stuxnet—The First Cyber Guided Missile
Episode 1 of Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare Series
Your introduction to the fascinating--and fascinatingly dangerous--world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which…
The Arrival of Robot Autonomy
Episode 1 of Robotics Series
Plunge into the world of robots with this engaging introduction. When did we start thinking about robots? What three components are responsible for so many advances in robot design? Why is behavioral autonomy so essential to the development of modern…
Facebook Follies
With nearly a billion people all over the world having signed on, Facebook has fundamentally changed the way millions of people connect and communicate - but not without consequences. Facebook Follies looks at some of the unexpected results and impact,…
2 videos
Journalism Secrets to Social Media Storytelling & News Reporting
Social media tools are being used across all media sources including traditional news outlets and online-based resources. This program focuses on the variety of ways social media is essential to storytelling and news distribution. Each chapter highlights an element of…
Computation and Logic Gates
Episode 2 of The Science of Information
Accompany the young Claude Shannon to the Massachusetts Institute of Technology, where in 1937 he submitted a master's thesis proving that Boolean algebra could be used to simplify the unwieldy analog computing devices of the day. Drawing on Shannon's ideas,…
Of Viruses, Botnets, and Logic Bombs
Episode 4 of Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare Series
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then,…
Social Media - What You Don’t Know Can Hurt You
As postings on social media have routinely replaced conversations over lunch or around the water cooler, workers have filed almost 100 social media-related complaints against employers with the National Labor Relations Board. Mich'l Schmidt, a partner at Cozen O'Connor P.C.,…