Bomb-sniffing dog to help Clemson University Police Department
The Clemson University Police Department is enhancing campus safety with the help of a four-legged friend. Doc, a 2-year-old black Labrador retriever, is a trained explosives-sniffing dog that has come to the department as a result of a $15,000 Homeland Security grant obtained by the South Carolina Law Enforcement Division. The dog will be used to sweep venues such as Memorial Stadium and Littlejohn Coliseum before major events such as football and basketball games, concerts and graduations. The
Business Improvement Districts, Spring 2003
Focuses on the role of the business improvement district (BID) as a popular and contemporary tool for urban revitalization. Explores BID origins, theoretical underpinnings, enabling legislation, and organizational issues. Emphasizes BID service provision including advocacy, marketing, sanitation, streetscape improvement, security and transportation, while examining BID performance using such indicators as crime rates, vacancy rates, and retail sales. Considers BID organizations throughout North
Duke on Demand Highlights for the Week of October 10, 2010
This week on Duke on Demand, leaders at Duke held a forum recently to discuss the university's plans and principles for operating in other countries. Duke University teams up with Duke Energy to turn hog waste into electricity. Is your phone spying on you? Duke researchers study smart phone security. And, the DukeReads online book club lets you engage with faculty members on their favorite books.
Raw Life, New Hope: Decency, housing and everyday life in a postapartheid community
Raw Life New Hope is the story of one community's efforts to secure a decent life in post-apartheid South Africa For residents of The Park a squalid shantytown on the outskirts of Cape Town life was hard and they described their social world as raw Efforts to get on with the messy business of everyday life were often underut by cruel poverty. Despite inhospitable conditions they sought to create respectable lives. The opportunity of formal housing fired them with enthusiasm as they saw the possi
SecondLife: A Computer-Mediated Tool for Distance-Learning in Architecture Education?
Despite the importance of distance learning for its ability to reach a wide audience, easiness to access materials, and its lower cost compared to traditional learning, architecture education has not been well served by distance education. This is because it has a higher level of learning objectives, it is taught by coaching methodologies, and involves nonverbal forms of communication. One of the most common learning methods used in the design studio is the Criticism/Critique, which is a graphic
Security and Privacy?
The Information Networking Institute celebrated its 20 year anniversary in April 2010. This panel discussion, moderated by Pradeep K. Khosla, Dean, College of Engineering; Philip and Marsha Dowd Professor, Electrical and Computer Engineering, discussed how Carnegie Mellon is driving research over the hurdle of this dichotomy between security and privacy. Panelists were Alessandro Acquisti, Associate Professor of Information Technology and Public Policy, Heinz College; Lorrie Cranor, Associate
6.876J Advanced Topics in Cryptography (MIT)
The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.
Carnegie Mellon in Silicon Valley - Overview
Carnegie Mellon University in Silicon Valley offers graduate degrees to working professionals in the epicenter of the software industry. Since its launch in 2002, the campus has grown to include full time and part-time software master's degrees, bicoastal degrees and PhD in Electrical & Computer Engineering degrees, with research focused on software mobility, networking, security and robotics. The campus is strategically located at NASA Ames Research Park in Mountain View, California.
6.857 Network and Computer Security (MIT)
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Forma
15.433 Investments (MIT)
The focus of this course is on financial theory and empirical evidence for making investment decisions. Topics include: portfolio theory; equilibrium models of security prices (including the capital asset pricing model and the arbitrage pricing theory); the empirical behavior of security prices; market efficiency; performance evaluation; and behavioral finance.
15.566 Information Technology as an Integrating Force in Manufacturing (MIT)
In virtually every industry and every firm, information technology is driving change, creating opportunities and challenges. Leaders who don't understand at least the fundamentals of information systems will be at a strategic disadvantage. This course provides broad coverage of technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. There will be a special emphasis
17.471 American National Security Policy (MIT)
This course examines the problems and issues confronting American national security policymakers and the many factors that influence the policies that emerge. But this is not a course about "threats," military strategies, or the exercise of military power. What threatens those interests? How should the U.S. defend those interests? What kind of military should we build? Should the U.S. enter into alliances with other countries? Do we need a larger Navy? How much should we spend on weapons procure
6.171 Software Engineering for Web Applications (MIT)
6.171 is a course for students who already have some programming and software engineering experience. The goal is to give students some experience in dealing with those challenges that are unique to Internet applications, such as: concurrency; unpredictable load; security risks; opportunity for wide-area distributed computing; creating a reliable and stateful user experience on top of unreliable connections and stateless protocols; extreme requirements and absurd development sch
17.484 Comparative Grand Strategy and Military Doctrine (MIT)
This course will conduct a comparative study of the grand strategies of the great powers (Britain, France, Germany and Russia) competing for mastery of Europe from the late nineteenth to the mid-twentieth century. Grand strategy is the collection of political and military means and ends with which a state attempts to achieve security. We will examine strategic developments in the years preceding World Wars I and II, and how those developments played themselves out in these wars. The following qu
17.952 Great Power Military Intervention (MIT)
The purpose of this seminar is to examine systematically, and comparatively, great and middle power military interventions into civil wars during the 1990's. These civil wars were high on the policy agenda of western states during the 1990's. Yet, these interventions were usually not motivated by obvious classical vital interests. Given the extraordinary security enjoyed by the great and middle powers of the west in the Cold War's aftermath, these activities are puzzling.
17.953 U.S. Military Budget and Force Planning (MIT)
The United States is spending about $400 billion this year on national defense, some $40 billion on homeland security, and $85 billion on military operations and nation-building in Iraq and Afghanistan. This course is for students who want to know how the dollars we spend on national security relate to military forces, systems, and policy choices, and who wish to develop a personal tool kit for framing and assessing defense policy alternatives. The course aims to familiarize students with budget
6.897 Selected Topics in Cryptography (MIT)
This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved
17.951 Intelligence: Practice, Problems and Prospects (MIT)
This course will explore the organization and functions of the U.S. Intelligence Community, its interaction with national security policymakers, key issues about its workings, and the challenges it faces in defining its future role. The events of 9/11 and the invasion of Iraq have focused new attention on national intelligence, including the most significant reorganization of the community since the National Security Act of 1947. The course will highlight some of the major debates about the role
17.407 Chinese Foreign Policy (MIT)
This lecture course provides students with a comprehensive introduction to the international relations of the People’s Republic of China. China’s foreign relations during the Cold War as well as contemporary diplomatic, security and economic issues will be examined to identify and explain China’s foreign policy goals and their implementation since 1949. Throughout, this course will investigate the sources of conflict and cooperation in China’s behavior, assessing competin
This is a really good video that explains Stephen Hawking's theory on Black Holes. The video provides several relateable examples of concepts discussed in the the theory. The video also provides viewpoints from other experts as well.