Hitlers Death - The Final Report - Part 5 of 5
There are images of a film that represented Hitler's death. One of the prisoners who had been in the bunker is shown today retelling the story again at the same place where the bodies had been burnt. There are images of the skull parts that were found in the place. The last remains fo the bodies were destroyed in 1970.
Author(s): No creator set

License information
Related content

From Axons To Tracts: A Journey Through the Brain's Wiring
Video uses light images to show the complex circuitry interconnecting different areas in the brain, known collectively as white matter, is composed of millions of axons organized into fascicles and bundles. The video begins with a transverse section of tightly packed axons as seen through light microscopy. Although represented as a two-dimensional "slice", we see that these axons in fact resemble tubes.  As we zoom out even more, we realize that it is a portion of the corpus callosum connecting
Author(s): No creator set

License information
Related content

Taming The American West Unit 13
Western settlers’ assumptions of an endless, bountiful frontier were
tested when they moved to the Great Plains and attempted to cultivate the unfamiliar, arid landscape. This experience led to the rise of populist politics, which championed farmers’ and industrial workers’
critique of political and economic powers.

Author(s): No creator set

License information
Related content

Global America Unit 21
As the turn of the century approached, the pendulum of American politics and social structures began to swing back toward conservativism. With immigration from Asia and the Americas on the rise, the face of America changed rapidly. This unit examines the competing forces of ethnic and American identity in a world dominated by globalization and one remaining “superpower.
Author(s): No creator set

License information
Related content

Gender-Based Distinctions
Tim Rockey teaches 12th–grade American government and politics at
Sunnyslope High School in Phoenix, Arizona. Mr. Rockey reviews the
concept of civil rights, with a focus on women’s rights. Students
evaluate the "reasonableness" standard as set by the court and come to understand where the court has drawn the line for gender–based
decisions. They explore the following questions: Can public taverns
cater only to men? Can females be excluded from contact sp

Author(s): No creator set

License information
Related content

A Human Story of Computer Animation
It took 20 years of dreaming, planning and ingenuity to create Toy Story, the world s first computer animated full-length feature film, in 1995. It represented a significant departure from the long-established methods of animation, where artists would hand draw characters frame by frame, and painstakingly incorporate movement and color to complete a feature film. Today, thanks to advances in computing power and ingenious software, there is little separation between the refining of an idea and it
Author(s): No creator set

License information
Related content

sh - Phonics
This is clip about when sh is represented by other graphemes in writing. The unique sound in special, sugar, mission, station and ocean is presented with the words as the narrator says the word.

Author(s): No creator set

License information
Related content

Is there a Crisis in World Journalism? Dr George Nyabuga
Dr George Nyabuga is an award-winning journalist and acclaimed media trainer. He joined Media Convergence Group as Managing Editor earlier this year and has key responsibilities across the Group's multi-media platforms. Dr Nyabuga holds a PhD in Politics, History and Media and a Masters in Online Journalism. Nyabuga brings wide-ranging hands-on experience as a journalist in Kenya, South Africa and the US. He has taught journalism, media and cultural studies at Worcester and Coventry universities
Author(s): No creator set

License information
Related content

The European Feminist Forum: A Herstory, 2004-2008
This is a book of information gathered through the European Feminist Forum. The book is a compilation of articles on the most important issues facing feminists in the new Europe, including: migration, employment, new organizing and fundraising strategies, the dialogue between different generations of women, and the politics surrounding sexuality and women’s bodily integrity.
Author(s): No creator set

License information
Related content

Asian Security Seminar - The Geopolitics of Energy
The purpose of this seminar is, first, to remind ourselves of the importance of economic change and policies to geopolitics; and, second, to note various new dimensions to energy issues that I refer to as the 'new' geopolitics of energy. The reality that oil and natural gas are strategic commodities, as the US rejection, largely on nationalist and security grounds of the Chinese oil company (CNOOC)'s bid for Unocal, reminds us, is by no means new though it now has a new intensity. We have increa
Author(s): No creator set

License information
Related content

Does China play by our rules: and how much does it matter?
The arrest of Rio Tinto executive Stern Hu, and more recently China's cancellation of a ministerial visit over Canberra's decision to grant a visa to Uighur figurehead Rebiya Kadeer has put Australia-China relations sharply in focus. Relations between these key trading partners appears rocky at a time many would have envisioned ties to be getting warmer. China's behaviour has prompted many to look at China's internal politics and rule of law, as well as the price paid for dealing with China and
Author(s): No creator set

License information
Related content

Afghanistan's Elections: Can Straw be Spun into Gold?
Afghanistan's presidential election on 20 August has triggered a storm of complaints, and widespread apprehension on the part of international commentators. Yet the question of how to move forward constructively is on the desk of foreign ministries in many major capitals. In this lecture Professor Maley, who was an accredited international observer for the election, offers an account of the forces that have brought Afghanistan to this pass, and some suggestions about what might be required to av
Author(s): No creator set

License information
Related content

War 2.0: Political Violence & New Media: 02 Traditional Voices - Responding to New Toys, New Challen
Today, war is conducted not only by the dispatch of Tomahawks in the air or Kalashnikovs and suicide attacks on the ground but also by means of bytes, tweets, digital images, and social networking forums. (New) media technology, in other words, has become a medium of war and diplomacy. This multidisciplinary two-day symposium on 7-8 October hosted by the Department of International Relations at the ANU will map the shifting arena of war, conflict, terrorism, and violence in an intensely mediated
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 1: "Introduction" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 1 includes introductory remarks by H. Vincent Poor, and a survey talk by
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 1: "Introduction" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 1 includes introductory remarks by H. Vincent Poor, and a survey talk by
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 2: "Possession and ownership of data" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 2 includes the first panel of the workshop, entitled "Possession and own
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 2: "Possession and ownership of data" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 2 includes the first panel of the workshop, entitled "Possession and own
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 3: "Security and risk in the cloud" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 3 includes the second panel of the workshop, entitled "Security and risk
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 3: "Security and risk in the cloud" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 3 includes the second panel of the workshop, entitled "Security and risk
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 4: "Princeton Research" – January 15, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 4 includes a presentation and discussion of Princeton research. Sponsor
Author(s): No creator set

License information
Related content