Massachusetts Institute of Technology

Displaying 1-40 of 494 results

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Saddle Point in the Minimax Converse for Channel Coding

    A mini-max meta-converse has recently been proposed as a simultaneous generalization of a number of classical results and a tool for the non-asymptotic analysis. In this paper it is shown that the order of optimizing the input and output distributions can be interchanged without affecting the bound. In the course...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Empirical Rate-Distortion Study of Compressive Sensing-Based Joint Source-Channel Coding

    Compressive Sensing (CS) is a novel technique which allows to reconstruct signals using much fewer measurements than traditional sampling methods by taking advantage of the sparsity of the signals to be compressed. Previous works related to the rate-distortion analysis of CS have been focused on its performance related to image...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2008

    Refactoring Sequential Java Code for Concurrency Via Concurrent Libraries

    Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 package java.util.concurrent (j.u.c.) supports writing concurrent programs: much of the complexity of writing threads-safe and scalable programs is hidden in the library. To use this package, programmers still need to reengineer existing code. This is tedious...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2009

    Distributed Quota Enforcement for Spam Control

    Spam, by overwhelming inboxes, has made email a less reliable medium than it was just a few years ago. Spam filters are undeniably useful but unfortunately can flag non-spam as spam. To restore email's reliability, a recent spam control approach grants quotas of stamps to senders and has the receiver...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2009

    Rethinking Wireless Broadband Platforms

    A platform network is an integrated high-capacity general-purpose network. The platform model dominates the market for wired broadband services, reducing the amount of infrastructure required and enabling rapid deployment of new services. It argues that wireless broadband is fundamentally different from wired broadband in ways that limit the benefits of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    A Distributed Wearable, Wireless Sensor System for Evaluating Professional Baseball Pitchers and Batters

    This paper introduces a compact, wireless, wearable system that measures signals indicative of forces, torques and other descriptive and evaluative features that the human body undergoes during bursts of extreme physical activity (such as during athletic performance). Standard approaches leverage high-speed camera systems, which need significant infrastructure and provide limited...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

    Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2008

    Assessing the Impact of a Tablet-PC-Based Classroom Interaction System

    This paper describes a strictly controlled study of the impact that Classroom Learning Partner, a Tablet-PC-based classroom interaction system, had on student performance. The goal of the study was to test the hypothesis that the use of such a system improves student learning, especially among the poorest performing students. This...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Efficient and Robust TCP Stream Normalization

    Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an in line network element that thwarts evasion attempts by removing ambiguities in network traffic. A particularly challenging step in normalization is the sound...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2008

    Network Coding Meets TCP

    This paper propose a mechanism that incorporates network coding into TCP with only minor changes to the protocol stack, thereby allowing incremental deployment. In this scheme, the source transmits random linear combinations of packets currently in the congestion window. At the heart of the scheme is a new interpretation of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Locating Cache Performance Bottlenecks Using Data Profiling

    Every organization understands the need of effective use of CPU data caches to ensure good performance. Yet, this is made difficult due to the fact that it is extremely tough to spot poor cache patterns with the existing execution profiling tools. Typical profilers attribute costs to specific code locations. It...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications

    Peer-to-peer systems and applications are distributed systems without any centralized control or hierarchical organization, where the software running at each node is equivalent in functionality. A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Efficient Cache Coherence on Manycore Optical Networks

    Ever since industry has turned to parallelism instead of frequency scaling to improve processor performance, multicore processors have continued to scale to larger and larger numbers of cores. Some believe that multicores will have 1000 cores or more by the middle of the next decade. However, their promise of increased...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Institutional Foundations for Cyber Security: Current Responses and New Challenges

    This paper profiles institutions that are responsible for addressing threats to cyber security. Rather than focusing primarily on the private sector, the authors analyze key organizations at the national, international, and intergovernmental level. The purpose is to highlight emerging responses and challenges, while simultaneously evaluating the strengths and weaknesses of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Mobile Broadband and Implications for Broadband Competition and Adoption

    The growth of wireless mobile broadband has the potential to drive significant new growth in Internet applications, services, and equipment markets. It is likely to represent as important a change for the Internet as the transition from dial-up to broadband, fundamentally changing the landscape for broadband Internet access by adding...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes

    This paper describes a method to encode fingerprint biometrics securely for use, e.g., in encryption or access control. The system is secure because the stored data suffices to validate a probe fingerprint but not to recreate the original fingerprint biometric. Therefore, a breach in database security does not lead to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    ATAC: On-Chip Optical Networks for Multicore Processors

    ˆe trend in modern microprocessor architectures is clear: multicore is here. As silicon resources become increasingly abundant, processor designers are able to place more and more cores on a chip: AMD and Intel have released 2-core chips with 4-core offerings coming soon. Forecasts show that by 2014, processors may contain...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Secure Network Coding for Multi-Resolution Wireless Video Streaming

    Emerging practical schemes indicate that algebraic mixing of different packets by means of random linear network coding can increase the throughput and robustness of streaming services over wireless networks. However, concerns with the security of wireless video, in particular when only some of the users are entitled to the highest...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Towards An Integration Of The Lean Enterprise System, Total Quality Management, Six Sigma And Related Enterprise Process Improvement Methods

    The lean enterprise system, total quality management, six sigma, theory of constraints, agile manufacturing, and business process reengineering have been introduced as universally applicable best methods to improve the performance of enterprise operations through continuous process improvement and systemic planned enterprise change. Generally speaking, they represent practice-based, rather than theory-grounded,...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Disciplined Agility For Process Control & Automation

    Process Automation systems can impact the operating cost of manufacturing equipment, the safe control of large quantities of energy and the safety of dangerous substances used during manufacturing. The manufacturing segment expects greater automation of larger processes, increased capability of process automation systems, and higher quality of those systems. At...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Lean Visual Management In An ERP/MES-Controlled Production Cell

    As a company grows, more and more effort is needed to control and coordinate operations. Typically, this is accomplished through an evolving collection of systems and processes, such as an Enterprise Resource Planning (ERP) system, but such systems also influence how a company does business, reviews performance, and communicate results....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Mitigating The Risk Of A New Workforce By Reducing Rework And Rightsizing On Hand Inventory

    Dramatically increasing the hourly workforce at a rapid pace to support accelerated product demand in an aircraft manufacturing facility in a short amount of time resulted in: increased rework, and increased part damage during assembly. The majority of rework results from simple workmanship mistakes from the new workforce. The approach...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Understanding Enterprise Behavior Using Hybrid Simulation Of Enterprise Architecture

    Today, the design of business enterprises is much more art than science. The complex structure and behavior of enterprises makes it difficult to untangle cause and effect amidst its components and their relationships. In order for managers to understand how an enterprise's architecture affects its behavior, they need tools and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Enabling Cultural Shifts: An Enterprise Approach Toward Lean Thinking

    The Supply Planning Operations team, in a large manufacturing firm, faced a future where their complexity of scope was increasing without an increase in resource levels. As an effort to improve both efficiency and effectively within the organization, they chose to adopt Lean Thinking as a method to streamline and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2008

    Commonality In Complex Product Families: Implications Of Divergence And Lifecycle Offsets

    Commonality, or the sharing of components, processes, technologies, interfaces and/or infrastructure across a product family, represents one of many potential tools for increasing corporate profitability. Industrial interest in commonality is strong, but results appear to be mixed. A rich stream of academic research has examined commonality (typically under terms such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    A Screening Model To Explore Planning Decisions In Automotive Manufacturing Systems Under Demand Uncertainty

    Large-scale, complex engineering systems, as for automotive manufacturing, often require significant capital investment and resources for systems configuration. Furthermore, these systems operate in environments that are constantly changing due to shifts in macroeconomic, market demand and regulations, which can significantly influence systems' performance. It is often very difficult or prohibitively...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Electricity Transmission Policy For America: Enabling A Smart Grid, End-to-End

    This paper proposes a framework of policies to guide the future development of America's electric transmission grid so that the electric power industry will be able to serve more effectively the changing needs of the U.S. economy and society. The paper provides a factual overview of the American electric power...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    Dynamic Pricing Through Sampling Based Optimization

    In this paper the authors develop an approach to dynamic pricing that combines ideas from data-driven and robust optimization to address the uncertain and dynamic aspects of the problem. In this setting, a firm offers multiple products to be sold over a fixed discrete time horizon. Each product sold consumes...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2010

    Transparent Detection of Computer Malware Using Virtualization

    In this paper, the author explores malware detection using a combination of virtualization- and storage-based intrusion detection techniques. By monitoring disk activity of a virtual machine and correlating that activity to knowledge of the filesystem structure on the virtual machine's disk, an intrusion detection system can react to file changes...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2008

    Climate Change: Challenges And Opportunities For Business And Society

    Richard Locke explains, sustainability is not an "In vogue concept" that is about environment or climate change. Rather, it is "An incredible opportunity for new business, and for existing enterprise to reinvent their practices". He invites panelists and audience at Convocation sessions to engage in dialog about moving beyond theory...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2008

    Opportunities In Building More Sustainable Supply Chains

    When a global corporation implements sustainability standards, it pays to work closely with supply chains, as these panelists attest. From his research, Richard M. Locke knows that the traditional methods of achieving decent labor conditions don't work well.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2008

    Getting Unstuck: How To Promote More Sustainable Practices In Our Organizations

    All that's required to achieve sustainability says Rebecca Henderson, is to clean up your current operations and/or rethink the business. "That's easy," she says. Henderson has spent much of her career trying to help firms embrace and survive such transformations. She and her colleagues have analyzed why businesses get stuck...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2008

    Opportunities In Infrastructure And Built Environments

    Half the world's population currently lives in cities, and that number is spiraling upward, as urban settlements gobble up most of the world's natural resources and emit the most pollutants. No wonder that these panelists perceive the challenge (and opportunity) of sustainability as much bigger than getting people to switch...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2008

    MIT Experts Analyze Financial Crisis, Debate Cures

    In this webcast a panel of five MIT faculty experts in economics and business analyze the ongoing financial crisis in the U.S. and world markets at a special session Oct. 8.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2008

    Leading Change: A Conversation With Ron Williams

    In what Dean Dave Schmittlein bills as a master class, Ronald A. Williams discusses how an emphasis on new technology and application of basic values helped turn around the health care giant Aetna.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2008

    Building The Next Generation Company: Innovation, Talent, Excellence

    While the ongoing world economic crisis has left many business leaders sweating (or worse), John Chambers is rolling up his sleeves in anticipation of an eventual recovery. After every economic challenge, he says, Cisco has come out with dramatic gains in market share. This time won't be different, if Chambers'...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2008

    What (If Anything) Should Be Done About Improving The System Of Electing A President?

    As David King puts it, "The Constitution has an on the one hand, on the other quality," and the Electoral College seems a focal point for contrariness and ambivalence. King ticks off areas where the EC can be viewed alternatively: for instance, does it encourage healthy, broad-based campaigning and widespread...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2008

    George Soros On The New Paradigm For Financial Markets

    George Soros extends his "Theory of reflexivity" from abstraction to application in the realm of investing. His book, The New Paradigm for Financial Markets, offers a timely look at the credit crisis that reached crescendo in 2008. His views fall between prescience and vindication. Nevertheless, he concedes fallibility: "With all...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2008

    Achieving U.S. Energy Security Through Energy Diversity

    We've been spoiled as a nation, says Bob Malone. For decades, energy was inexpensive and abundant, and most Americans took it for granted. Recently "We've seen the world change around us." Successive presidential administrations have failed to free the nation of dependence on foreign oil, and to advance alternatives to...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2008

    Nurturing A Vibrant Culture To Drive Innovation

    W.L. Gore's products alone, such as the eponymous GORE-TEX water- and windproof fabrics, and a multitude of unique medical, electronic and industrial materials, might seem to assure the company's success. But Terri Kelly attributes the 50-year-old company's achievements not just to engineering prowess, but to its singular culture.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2009

    Challenges To The Global Economy

    Martin Feldstein had a hard time choosing which of the innumerable problems to focus on, he admits, but ultimately settles on near-term challenges faced by the U.S. First off, this downturn is a typical, past recessions generally resulted from the Federal Reserve responding to inflation by nudging up interest rates...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2009

    Observations On The Science Of Finance In The Practice Of Finance

    Merton uses deceptively simple graphs to show how risk propagated rapidly across financial networks, bringing down financial institutions. While he admits the crisis "Is very big and complicated," Merton boils a piece of it down to the use of put options, a derivative contract that's been around since the 17th...

    Provided By Massachusetts Institute of Technology