Policy Changes Facing Mexico: Session Five
Georgetown University hosts a series of six panel discussions entitled, ?Law, Justice, and Public Security: Challenges for Mexico and Its Neighbors.? The purpose of the seminar is to promote a deeper understanding of the root causes of public insecurity in Mexico and the prospects for reform in the remaining three years of President Felipe Calderon?s administration?and beyond.
Author(s): No creator set

License information
Related content

Policy Changes Facing Mexico: Session Three
Georgetown University hosts a series of six panel discussions entitled, ?Law, Justice, and Public Security: Challenges for Mexico and Its Neighbors.? The purpose of the seminar is to promote a deeper understanding of the root causes of public insecurity in Mexico and the prospects for reform in the remaining three years of President Felipe Calderon?s administration?and beyond.
Author(s): No creator set

License information
Related content

Policy Changes Facing Mexico: Session One
Georgetown University hosts a series of six panel discussions entitled, ?Law, Justice, and Public Security: Challenges for Mexico and Its Neighbors.? The purpose of the seminar is to promote a deeper understanding of the root causes of public insecurity in Mexico and the prospects for reform in the remaining three years of President Felipe Calderon?s administration?and beyond.
Author(s): No creator set

License information
Related content

Bueno de Mesquita on Iran and Threats to U.S. Security
Bruce Bueno de Mesquita of Stanford University's Hoover Institution and New York University talks to EconTalk host Russ Roberts about threats to U.S. security, particularly Iran. Bueno de Mesquita argues that Iran is of little danger to the United States. He then looks at what Iran has to gain and to lose by appearing to build a nuclear weapons program and actually using a nuclear weapon. He then goes on to examine the nature of other threats to the United States. The closing topic of the conver
Author(s): No creator set

License information
Related content

Olympic security : Better planning can enhance U.S. support to future Olympic Games
This is a United States Government Accountability Office report to the Committee on International Relations, House of Representatives on Olympic security. Published in June 2006 the full-text (43 pages) can be downloaded for free as a PDF file. The report recommends that the Secretary of State develop written guidance for providing U.S. government security support to future Games and develop a finance subgroup within the interagency working group to help agencies plan and prepare for future supp
Author(s): No creator set

License information
Related content

Powering the Planet: The Challenge for Science in the 21st Century
The supply of secure, clean, sustainable energy is arguably the most important scientific and technical challenge facing humanity in the 21st century. Rising living standards of a growing world population will cause global energy consumption to increase dramatically over the next half century. Within our lifetimes, energy consumption will increase at least two-fold. This additional energy needed is not attainable from long discussed sources, the global appetite for energy is simply too much. Pet
Author(s): Creator not set

License information
Related content

Rights not set

GoingNative 23: Introducing Shared Mutex in C++14 | C9::GoingNative

Visual C++ dev Gor Nishanov gives a talk on the different mutex's [mutual exclusion] available in C++ and a new addition in C++14!

Please feel free to comment below, and also let us know if there's any native content that you'd like to see in upcoming episodes!

Author(s): Gabriel Ha

License information
Related content

Rights not set

Session III: Religion, Politics, and Armed Rebellion
1810 ~ 1910 ~ 2010 Mexico's Unfinished Revolutions Session III: Religion, Politics, and Armed Rebellion Brian Connaughton, Universidad Aut├│noma Metropolitana-Iztapalapa, ┬┐Conjoined, Subservient, or Autonomous? Religion / Church and Rule in Independent Mexico Matthew O'Hara, UC Santa Cruz, Visions of the Future in Mexico's Independence Era Matthew Butler, University of Texas at Austin, The Nave of the Patria? The Revival of Liberal Catholicism in Post-revolutionary Mexico Moderated by Margar
Author(s): No creator set

License information
Related content

Sexual Sedition: Secularism, Moral Regulations and the U.S. National Security State
Course - Group - Sexual Sedition: Secularism, Moral Regulations and the U.S. National Security State - Arizona State University > Religion and Conflict > Sexual Sedition: Secularism, Moral Regulations and the U.S. National Security State
Author(s): No creator set

License information
Related content

Talk: Security needed in Pakistan, says David Rohde
New York Times reporter says security needed for progress in Pakistan
Author(s): No creator set

License information
Related content

7A. Security of Geological CO2: What Do We and Don't We Know
Course - Group - 7A. Security of Geological CO2: What Do We and Don't We Know - Stanford > Energy Seminar (Spring 2007) > 7A. Security of Geological CO2: What Do We and Don't We Know
Author(s): No creator set

License information
Related content

7. Security of Geological Storage of CO2: What Do We and Don't We Know?
carbon dioxide, capture, storage, research, security, geological, emission, pollution, coal, fuel, fossil, technology, permanent, underground, gas, recover, trap, production, oil, methane, water, procedure, industry, experience, natural, project, manage,
Author(s): No creator set

License information
Related content

5. Technology and Policy Implications of Global Energy Scenarios for the 21st Century
efficient, energy, sustainable, resources, industrialization, security, invest, public, fossil, fuel, policy, report, compete, scenario, climate, impact, model, scenario, technique, scenario, analyze, future, primary, carbon, emit, pollution, renewable, c
Author(s): No creator set

License information
Related content

From Personal Computers to Personal Information Environments (November 10, 2006)
devices, multiple, collaborate, display, desktop, mobile, personal, space, user, innovation, interfaces, information, synchronize, network, share, access, security, connection, opportunity, experience, efficient, transfer, communication, SEREFE, message,
Author(s): No creator set

License information
Related content

9. Data in Your iPhone App (February 2, 2010)
Software engineering, application development, programming language, computer science, iPhone operating system, OS 3.2, iPad, core data, local data, property lists, disk storage, XML, binary, array, dictionary, file system, mutability, security, privacy,
Author(s): No creator set

License information
Related content

09 - Guest Lecture by David Swensen
David Swensen, Yale's Chief Investment Officer and manager of the University's endowment, discusses the tactics and tools that Yale and other endowments use to create long-term, positive investment returns. He emphasizes the importance of asset allocation and diversification and the limited effects of market timing and security selection. Also, the extraordinary returns of hedge funds, one of the more recent phenomena of portfolio management, should be looked at closely, with an eye for survivor
Author(s): No creator set

License information
Related content

Getting Away With Murder: State Violence and Impunity in Phatthalung, 1972-1975
In February 1975, student activists exposed a series of brutal murders of citizens by Communist Suppression Operations Command and other state security forces that had taken place two-and-a-half years earlier in Phatthalung province in mid-southern Thailand. The thang daeng, or 'red drum,' killings gained their name from the method of killing employed. Accused of engaging in Communist activities, or tacit support for them, citizens were arrested, or simply taken, in large sweeps across districts
Author(s): No creator set

License information
Related content

Exam 2 Review Session - David J. Malan, Harvard Computer Science
Review multimedia, security, website development, and programming!
Author(s): No creator set

License information
Related content

Security - David J. Malan, Harvard Computer Science
Threats to privacy: cookies, forms, logs, and data recovery. Security risks: packet sniffing, passwords, phishing, hacking, viruses and worms, spyware, and zombies. Piracy: WaReZ and cracking.
Author(s): No creator set

License information
Related content

Building Dynamic Websites - Harvard University
Today's websites are increasingly dynamic. Pages are no longer static HTML files but instead generated by scripts and database calls. User interfaces are more seamless, with technologies like Ajax replacing traditional page reloads. This course teaches students how to build dynamic websites with Ajax and with Linux, Apache, MySQL, and PHP (LAMP), one of today's most popular frameworks. Students learn how to set up domain names with DNS, how to structure pages with XHTML and CSS, how to program i
Author(s): No creator set

License information
Related content