ENGR 408 - Patent Law The Exchange: Diving into Murky Waters 12.740 Paleoceanography (MIT) Mass murder of Kherson Jews Lyudmila Burlaka, a Kherson Jew, escapes the grim fate of Kherson Jewry EAHA Day 3 Session 5C: Floods And Landslides Lecture Networks: Theory and Application Networked Computing: Storage, Communication, and Processing Digital Government 1: Information Technology and Democratic Politics Digital Government 2: Information Technology and Democratic Administration Michigan Journal of Social Work and Social Welfare IPL: Professor Tony Ballantyne - Knowledge and Communication in Colonial Otago IPL: Professor Tony Ballantyne - Knowledge and Communication in Colonial Otago Secure Online Communications Letter to Sarah Logue Multirate Filtering: Introduction (Thai Version) Promethean Tips - Flipchart Pages Speak Italian with Your Mouth Full - Lesson 8, part 1 (The Mediterranean Diet, part 1) ESG seminar on Italian language, culture, and food: ES.S41, Lesson 8, part 1 (1 of 3). Lecture notes available at: Lyndon Johnson Signs Voting Rights Act TED ED - Pick of the week Each Week we will be rummaging through TED-ED for the best video lessons to share with your students. This weeks video is One or One: Or is it? One bag of apples, one apple, one slice of apple -- which of these is one unit? Explore the basic unit of math (explained by a trip to the grocery store!) and discover the many meanings of one.
Antony Currie talks to "Dark Pools" author Scott Patterson about the rise of HFT systems that appear to be stealing a march on regular investors and whether regulators can keep up with Wall Street's tech revolution.
This class examines tools, data, and ideas related to past climate changes as seen in marine, ice core, and continental records. The most recent climate changes (mainly the past 500,000 years, ranging up to about 2 million years ago) will be emphasized. Quantitative tools for the examination of paleoceanographic data will be introduced (statistics, factor analysis, time series analysis, simple climatology).
Vanda Kriger, who was born in 1925 in Kherson and lived there during the war years, describes how in late September 1941 her mother, together with other Jews, was transported from a prison in Kherson to a murder site, where they were shot. She notes the three places where Jews from Kherson and prisoners of war were executed and buried in mass graves in Kherson and surrounding areas.
For more information: http://www1.yadvashem.org/untoldstories/database/murderSite.asp?site_id=214
Lyudmila Burlaka, who was born in 1935 in Kherson and lived there during the war years, describes how, together with other Jews, she was taken to be shot, how her mother pushed her out of a group of Kherson Jews doomed to death into a crowd of local spectators. She recounts how she was wounded by machine-gun fire but saved by local residents.
For more information: http://www1.yadvashem.org/untoldstories/database/murderSite.asp?site_id=214
Universities in the Eastern Africa Region have come together to implement an initiative Health Emergency Management Program (HEMP) that will build the capacity of local governments in the region to manage and plan for response to major disasters of public health importance. The Eastern African Region is prone to many natural and technological disasters of different kinds. There is not one nation in the region that is not vulnerable to the devastating effects of these disasters. Many of these dis
SI 508 has been taught in various forms from 2006 to 2008 to masterŐs students at the University of Michigan School of Information. The course covers topics in network analysis, from social networks to applications in information networks such as the Internet. I will introduce basic concepts in network theory, discuss metrics and models, use software analysis tools to experiment with a wide variety of real-world network data, and study applications to areas such as information retrieval.As a ne
SI 502 - To appreciate the opportunities and make wise choices about the use of technology, information professionals need to understand the architectures of modern information systems. In alternative system architectures, storage, communication, and processing substitute for and complement each other in different ways. This course introduces students, at several different levels of abstraction, to sets of functional components and alternative ways of combining those components to form systems.
SI 532 / SI 732 - Course is the first in a two-part sequence exploring contemporary practices, challenges, and opportunities at the intersection of information technology and democratic governance. Whereas the second course focuses on challenges and innovations in democratic administration, this first course focuses on theories and practices of democratic politics and the shifting role of information technologies in supporting, transforming, and understanding these. The first half of the course
This seven-week course is the second in a two-part sequence exploring contemporary practices, challenges, and opportunities at the intersection of information technology and democratic governance. This second half of the course takes on emerging directions in democratic administration Đ and the shifting role of information technologies in supporting, transforming, and understanding these. The course locates recent and emerging digital or e-government initiatives in historical, institutional, an
The Mission of the Michigan Journal of Social Work and Social Welfare is to promote dialogue about knowledge, values, skills, and social justice-related issues by providing students the opportunity to contribute to the social work body of literature. Founded by students at the University of Michigan School of Social Work in 2010, this journal aims to also serve as a forum for students to express their perspectives and their learning in a way that contributes to our profession and is committed to
Professor Tony Ballantyne presents his Inaugural Professorial Lecture on the topic of “Knowledge and Communication in Colonial Otago”. 8 May 2012
Professor Tony Ballantyne presents his Inaugural Professorial Lecture on the topic of “Knowledge and Communication in Colonial Otago”. 8 May 2012
A general introduction to planning for a more secure information and communications environment. Three units are currently available in this module: Access control (passwords and firewalls), Guarding against data loss, Hushmail, Information security planning.
In this video clip, Actor Benjamin Bratt reads a letter from a runaway slave to his former master. (3:17)
A sample-rate compressor removes (D-1) of every D input samples. A sample-rate expander inserts (U-1) zeros after every input sample.
Author(s):
http://speakcookitalian.blogspot.com/2012/04/lezione-numero-otto-la-dieta.html
On August 6, President Lyndon B. Johnson signed the Voting Rights Act of 1965 into law. In a speech delivered at the signing ceremony, Johnson describes the historic day as a triumph for freedom as huge as any victory won on any battlefield. (4:41)