Close message

Welcome to Kanopy

Brought to you by Fontana Regional Library

Not your library? Find it now

Professor at University of Chicago

Professor at University of Chicago >

70
Videos
Loading...
Stuxnet—The First Cyber Guided Missile
Episode 1 of Thinking about Cybersecurity
Your introduction to the fascinating--and fascinatingly dangerous--world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which…
Why Time Is a Mystery
Episode 1 of Mysteries of Modern Physics: Time Series
Begin your study of the physics of time with these questions: What is a clock? What does it mean to say that "time passes"? What is the "arrow of time"? Then look at the concept of entropy and how it…
The Importance of the Higgs Boson
Episode 1 of The Higgs Boson and Beyond Course
Why was the discovery of the Higgs boson such a big deal? That's the key question that Professor Carroll tackles in his illuminating introduction. Take a fascinating dive into the world of modern particle physics and see how the Higgs…
What Is Time?
Episode 2 of Mysteries of Modern Physics: Time Series
Approach time from a philosophical perspective. "Presentism" holds that the past and future are not real; only the present moment is real. However, the laws of physics appear to support "eternalism"--the view that all of the moments in the history…
Quantum Field Theory
Episode 2 of The Higgs Boson and Beyond Course
Toss out the textbook image of electrons circling an atom's nucleus. This lecture explores the big twist of quantum field theory: The world isn't really made of particles. They're fascinating and necessary figments of quantum mechanics created by observing the…
The Five Gateways of Internet Vulnerability
Episode 3 of Thinking about Cybersecurity
Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't…
Cyber Fraud, Theft, and Organized Crime
Episode 6 of Thinking about Cybersecurity
Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the…
Privacy for the Cyber Age
Episode 13 of Thinking about Cybersecurity
It appears our current conceptions of privacy in cyberspace will disappear. So what can we do about it? By exploring how the government and private sector use "Big Data"--and how "Big Data" can keep the government honest--you'll discover insights into…
Keeping Time
Episode 3 of Mysteries of Modern Physics: Time Series
How do we measure the passage of time? Discover that practical concerns have driven the search for more and more accurate clocks. In the 18th century, the problem of determining longitude was solved with a timepiece of unprecedented accuracy. Today's…
Protecting Yourself in Cyberspace
Episode 16 of Thinking about Cybersecurity
Get practical tips on how to reduce your own risk of danger online in your professional and personal life. You'll find out how to choose the most effective passwords, how to set up the most effective personal computer security systems,…
Time’s Arrow
Episode 4 of Mysteries of Modern Physics: Time Series
Embark on the quest that will occupy the rest of the course: Why is there an arrow of time? Explore how memory and aging orient us in time. Then look at irreversible processes, such as an egg breaking or ice…
The Rationale for a Space Telescope
Episode 1 of Experiencing Hubble
Begin your exploration of the scientific stories behind 10 of the most fascinating images made by the Hubble Space Telescope. In this episode, learn about Hubble's design and how its operations were almost cut short by a flaw in its…
Hacktivists and Insurgency
Episode 7 of Thinking about Cybersecurity
Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this episode, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate…
Time Travel
Episode 19 of Mysteries of Modern Physics: Time Series
Use a simple analogy to understand how a time machine might work. Unlike movie scenarios featuring dematerializing and rematerializing, a real time machine would be a spaceship that moves through all the intervening points between two locations in spacetime. Also…
Big Data—“They” Know Everything about You
Episode 12 of Thinking about Cybersecurity
In the first of two episodes on personal data tracking and privacy, ponder the problem of "Big Data"--where your Internet searches can be tracked, your cellphone can broadcast your geographical location instantly, and your online purchases can be catalogued. It's…
The Problem of Identity on the Network
Episode 5 of Thinking about Cybersecurity
Identification is perhaps the single most profound challenge for cybersecurity today. In this episode, delve into the question of network anonymity and identity. Who maintains domain names? How can people obscure their identities for malicious purposes? How are network designers…
Time in Quantum Mechanics
Episode 8 of Mysteries of Modern Physics: Time Series
Quantum mechanics is the most precise theory ever invented, yet it leads to startling interpretations of the nature of reality. Probe a quantum state called the collapse of the wave function that may underlie the arrow of time. Are the…
The Incredible Scope of Cyberspace
Episode 2 of Thinking about Cybersecurity
What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a…
Of Viruses, Botnets, and Logic Bombs
Episode 4 of Thinking about Cybersecurity
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then,…
The Second Law of Thermodynamics
Episode 5 of Mysteries of Modern Physics: Time Series
Trace the history of the second law of thermodynamics, considered by many physicists to be the one law of physics most likely to survive unaltered for the next thousand years. The second law says that entropy--the degree of disorder in…