Computing in the Cloud - Part 2: "Possession and ownership of data" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 2 includes the first panel of the workshop, entitled "Possession and own
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 2: "Possession and ownership of data" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 2 includes the first panel of the workshop, entitled "Possession and own
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 3: "Security and risk in the cloud" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 3 includes the second panel of the workshop, entitled "Security and risk
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 3: "Security and risk in the cloud" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 3 includes the second panel of the workshop, entitled "Security and risk
Author(s): No creator set

License information
Related content

Public address by King Abdullah II, Richardson Auditorium, Princeton University – February 29, 200
King Abdullah II, the reigning monarch of the Hashemite Kingdom of Jordan, delivered a policy address at Princeton University at noon Friday, Feb. 29, sponsored by Princeton"s Woodrow Wilson School of Public and International Affairs. King Abdullah addressed the future of Arab-American relations in the context of the Middle East"s current challenges, particularly how to resolve the Palestinian-Israeli conflict, which Jordan views as the most significant issue facing the region.
Author(s): No creator set

License information
Related content

Anthony Scaturro: Cyber Security for Non-technical Users Non-technical Users
Lunch 'n Learn presentation: Your work or home computer may contain information about yourself, (e.g., tax returns and other personal information), about others (e.g., work-related reports, databases), or about matters you are working on (e.g., research) that you may not want to share with the public. It is not uncommon for computer users to assume that the various computer and software vendors sell products that will protect such information “out-of-the-box.“ While their products may conta
Author(s): No creator set

License information
Related content

Anthony Scaturro: Cyber Security for Non-technical Users PDF
Lunch 'n Learn presentation: Your work or home computer may contain information about yourself, (e.g., tax returns and other personal information), about others (e.g., work-related reports, databases), or about matters you are working on (e.g., research) that you may not want to share with the public. It is not uncommon for computer users to assume that the various computer and software vendors sell products that will protect such information “out-of-the-box.“ While their products may conta
Author(s): No creator set

License information
Related content

The Role of Europe in a Multilateral World - November 19, 2009
In his lecture, “The Role of Europe in a Multilateral World,” Romano Prodi will examine the benefits and challenges presented by the European Union’s expansion. Although the enlargement of the union has had significant impact on the democratic transition in eastern Europe and has extended European markets, there is no unanimity on issues of security, energy, and foreign affairs. Prodi maintains that if the EU aims to play a key role on the world’s political stage, it will need to develop
Author(s): No creator set

License information
Related content

The Role of Europe in a Multilateral World - November 19, 2009
In his lecture, “The Role of Europe in a Multilateral World,” Romano Prodi will examine the benefits and challenges presented by the European Union’s expansion. Although the enlargement of the union has had significant impact on the democratic transition in eastern Europe and has extended European markets, there is no unanimity on issues of security, energy, and foreign affairs. Prodi maintains that if the EU aims to play a key role on the world’s political stage, it will need to develop
Author(s): No creator set

License information
Related content

Alex Halderman, Princeton University: "Securing the Electronic Ballot"
In the wake of the 2000 Florida recount debacle, many states turned to computer voting machines to increase election accuracy and security. Many computer scientists have long been skeptical of such machines, but only recently have researchers had access to them for study. In in his talk he describes how his colleagues and he examined several widely used electronic voting systems and discovered that they were susceptible to attacks that could alter election results and compromise the secrecy of
Author(s): No creator set

License information
Related content

Alex Halderman, Princeton University: "Securing the Electronic Ballot"
In the wake of the 2000 Florida recount debacle, many states turned to computer voting machines to increase election accuracy and security. Many computer scientists have long been skeptical of such machines, but only recently have researchers had access to them for study. In in his talk he describes how his colleagues and he examined several widely used electronic voting systems and discovered that they were susceptible to attacks that could alter election results and compromise the secrecy of
Author(s): No creator set

License information
Related content

Carlos Eire, Yale University: "A Brusque History of Eternity - Lecture 1: The Birth of Eternity" –
Until fairly recently eternity was no mere abstraction or metaphor in the Christian tradition, but rather the ultimate destination for humankind, a metaphysical conceit with practical implications as inescapable as legal obligations, or taxes, or death. Eternity was an ineffable mystery, to be sure, but of no less value in human interaction than money itself, or crowns and thrones. In our own day, however, eternity seems a purely abstract concept best left in the hands of astrophysicists, a frig
Author(s): No creator set

License information
Related content

Carlos Eire, Yale University: "A Brusque History of Eternity - Lecture 1: The Birth of Eternity" –
Until fairly recently eternity was no mere abstraction or metaphor in the Christian tradition, but rather the ultimate destination for humankind, a metaphysical conceit with practical implications as inescapable as legal obligations, or taxes, or death. Eternity was an ineffable mystery, to be sure, but of no less value in human interaction than money itself, or crowns and thrones. In our own day, however, eternity seems a purely abstract concept best left in the hands of astrophysicists, a frig
Author(s): No creator set

License information
Related content

03 - Technology and Invention in Finance
Technology and innovation underlie finance. In order to manage risks successfully, particularly long-term, we must pool large amounts of risk among many, diverse people and overcome barriers such as moral hazard and erroneous framing. Inventions such as insurance contracts and social security, and information technology all the way from such simple things as paper, and the postal service to modern computers have helped to manage risks and to encourage financial systems to address issues pertaini
Author(s): No creator set

License information
Related content

“A great moment for all those children." Kailash Satyarthi on being awarded the Nobel Prize
Kailash Satyarthi is very honoured to be awarded the 2014 Nobel Peace Prize together with Malala Yosufzai. Hear an interview with him about his reaction and what the Prize for his cause. “Everyone must acknowledge and see that child slavery still exists in the world in its ugliest face and form. And this is crime against humanity, this is intolerable, this is unacceptable. And this must go.” The interviewer is Adam Smith, Chief Scientific Officer at Nobel Media. Learn more about the Laurea
Author(s): No creator set

License information
Related content

カメラツールの設定
After Effects CS5の強化されたカメラツールの設定とマウスによる操作について学びます。
Author(s): No creator set

License information
Related content

Distinguished Alumni Awards 2010: Diane Warren
Biographical tribute video for Diane Warren ('78), one of the most successful and acclaimed songwriters of the last two decades and one of three honorees at the 2010 Distinguished Alumni Awards. Music, photographs, film/ video clips, and Diane Warren interview provided by Diane Warren and RealSongs. Used by permission. Mike Curb video message provided by Curb Records Edited by Krishna Narayanamurti Produced by Gray Mounger, Shellie Hadvina, Cheryl McMillan, the Alumni Relations Office, and the
Author(s): No creator set

License information
Related content

"The Underpants" Showing at SUNY Oswego
Student director Aaron Londraville discussing SUNY Oswego's staging of the farce "The Underpants" Nov. 16 to 20. The adaptation of the early 20th-century play is by comedian/actor/director Steve Martin.
Author(s): No creator set

License information
Related content

17.433 International Relations of East Asia (MIT)
The aim of this lecture course is to introduce and analyze the international relations of East Asia. With four great powers, three nuclear weapons states and two of the world's largest economies, East Asia is one of the most dynamic and consequential regions in world politics. During the Cold War, East Asia witnessed intense competition and conflict between the superpowers and among the states in the region. In the post-Cold War era, the region has been an engine of the global economy while unde
Author(s): Fravel, M. Taylor

License information
Related content

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative C

Macroeconomic Perspectives on Demand and Supply
OpenStax College
By the end of this section, you will be able to: Explain Say’s Law and determine whether it applies in the short run or the long run Explain Keynes’ Law and determine […]

Author(s): No creator set

License information
Related content