Massachusetts Institute of Technology

Displaying 1-40 of 491 results

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Saddle Point in the Minimax Converse for Channel Coding

    A mini-max meta-converse has recently been proposed as a simultaneous generalization of a number of classical results and a tool for the non-asymptotic analysis. In this paper it is shown that the order of optimizing the input and output distributions can be interchanged without affecting the bound. In the course...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Empirical Rate-Distortion Study of Compressive Sensing-Based Joint Source-Channel Coding

    Compressive Sensing (CS) is a novel technique which allows to reconstruct signals using much fewer measurements than traditional sampling methods by taking advantage of the sparsity of the signals to be compressed. Previous works related to the rate-distortion analysis of CS have been focused on its performance related to image...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Toward Sustainable Networking: Storage Area Networks with Network Coding

    Current projections indicate that the worldwide Data Center (DC) industry will require a quadrupling of capacity by the year 2020, primarily through increased demand for high-definition video streaming. In addition to requiring significant financial investments, worldwide DC capacities are approaching a scale in which their energy consumption and carbon footprint...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    CryptDB: A Practical Encrypted Relational DBMS

    CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are three novel ideas: an SQL-aware encryption strategy that maps SQL operations to encryption schemes, adjustable...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    SoftCast: Clean-Slate Scalable Wireless Video

    Video broadcast and mobile video challenge the conventional wireless design. In broadcast and mobile scenarios the bit rate supported by the channel differs across receivers and varies quickly over time. The conventional design however forces the source to pick a single bit rate and degrades sharply when the channel cannot...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Core Count Vs Cache Size for Manycore Architectures in the Cloud

    The number of cores which fit on a single chip is growing at an exponential rate while off-chip main memory bandwidth is growing at a linear rate at best. This core count to off-chip bandwidth disparity causes per-core memory bandwidth to decrease as process technology advances. Continuing per-core off-chip bandwidth...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    A Unified Operating System for Clouds and Manycore: Fos

    Single chip processors with thousands of cores will be available in the next ten years and clouds of multicore processors afford the operating system designer thousands of cores today. Constructing operating systems for manycore and cloud systems face similar challenges. This paper identifies these shared challenges and introduces them solution:...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Understanding and Supporting Directed Content Sharing on the Web

    To find interesting, personally relevant web content, the authors often rely on friends and colleagues to pass links along as they encounter them. This paper studies and augments link-sharing via e-mail, the most popular means of sharing web content today. Armed with survey data indicating that active sharers of novel...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Whanaungatanga: Sybil-Proof Routing With Social Networks

    Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    ATAC: A Manycore Processor With On-Chip Optical Network

    Ever since industry has turned to parallelism instead of frequency scaling to improve processor performance, multicore processors have continued to scale to larger and larger numbers of cores. Some believe that multicores will have 1000 cores or more by the middle of the next decade. However, their promise of increased...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2009

    Risk Allocation for Multi-Agent Systems Using T??tonnement

    This paper proposes a new market-based distributed planning algorithm for multi-agent systems under uncertainty; called MIRA (Market based Iterative Risk Allocation). In large coordination problems, from power grid management to multi-vehicle missions, multiple agents act collectively in order to optimize the performance of the system, while satisfying mission constraints. These...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    Oblivious Routing in On-Chip Bandwidth-Adaptive Networks

    Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by re-routing flows, but requires more complex hardware to determine and configure new routing paths. The authors propose on-chip bandwidth-adaptive networks to mitigate the performance problems...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2008

    Energy Scalability of On-Chip Interconnection Networks in Multicore Architectures

    On-Chip interconnection Networks (OCNs) such as point-to-point networks and buses form the communication backbone in systems-on-a-chip, multicore processors, and tiled processors. OCNs can consume significant portions of a chip's energy budget, so analyzing their energy consumption early in the design cycle becomes important for architectural design decisions. Although numerous studies...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2008

    Stochastic Combinatorial Optimization With Risk

    The authors have presented efficient approximation schemes for a broad class of stochastic problems that incorporate risk. Their algorithms are independent of the fixed feasible set and use solutions for the underlying deterministic problems as oracles for solving the stochastic counterparts. As such they apply to very general combinatorial and...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2008

    Global Television

    There's a lot that seems familiar on TV in other countries, and indeed, as these panelists recount, there's been a flow across borders of TV content and style nearly as long as the medium's been around.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2008

    The Way David Macaulay Works: Finding Ideas, Making Books And Visualizing Our World

    This webcast feels akin to a new Disney ride: During your tour inside the presenter's imagination, prepare to soar over Rome's great monuments, raft within the human body's circulatory system, and dismantle and rebuild the Empire State Building.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2008

    Beyond The Bench: Preparing MIT Students For The Challenges Of Global Leadership

    MIT produces students who are "Deep, entrepreneurial, passionate, diverse and active," says the author, the kind of talented individuals who should play major parts on the world stage. MIT has begun a drive to ensure that its students fulfill their promise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2007

    Is There A Black Architect In The House?

    "If there is any kind of profession that's gotten away with a kind of benign neglect of diversifying itself over the course of last 30 years, it's architecture," says the presenter. With one chart after another, he plots the dismal record of design schools, firms and professional associations in modifying...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Explorations in Cyber International Relations (ECIR) Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System

    Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative security measures needed to prevent and respond to cyber-security emergencies. The Exploring Cyber International Relations (ECIR) Data Dashboard project is an...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Legal Challenges and Strategies for Comparison Shopping and Data Reuse

    New technologies have been continuously emerging to enable effective reuse of an ever-growing amount of data on the Web. Innovative firms can leverage the available technologies and data to provide useful services. Comparison-shopping services are an example of reusing existing data to make bargain-finding easier. Certain reuses have caused conflicts...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    VPriv: Protecting Privacy in Location-Based Vehicular Services

    A variety of location-based vehicular services are currently being woven into the national transportation infrastructure in many countries. These include usage- or congestion-based road pricing, traffic law enforcement, traffic monitoring, "Pay-as-you-go" insurance, and vehicle safety systems. Although such applications promise clear benefits, there are significant potential violations of the location...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2009

    Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks

    A large fraction of email spam, Distributed Denial-of-Service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying human-generated traffic as such, one can service it with improved reliability or higher priority, mitigating the effects of...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Financial Re-Engineering

    Moderator William Wheaton starts the discussion by suggesting that the interconnected global system of financial markets may be inherently unmanageable and overly risky, due to its complexity. Financial transactions in a world of 8 billion people can become too complex, leading to uncontrollable systemic risk and disaster, much the way...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Planning The Response: Establishing The Impacts And Identifying The Parties At Risk

    The Deepwater Horizon disaster spread through not just a vast coastal ecosystem, but into diverse human communities lining the Gulf, many entirely dependent on the sea for their livelihoods. These three panelists describe their involvement in quite disparate response projects, which began shortly after the oil began gushing, and in...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Moving Ahead: Engineering Challenges Of Deep Water Drilling And Future Oil Resource Recovery

    To keep up with demand, the oil industry ventures increasingly farther and deeper offshore, extracting resources as fast as possible in often hazardous conditions with newly minted technology. So to these panelists, the BP Deepwater Horizon accident did not come as a complete surprise. However, they view the disaster from...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Democracy After Citizens United

    Just when it seemed the corrosive influence of big money on American politics could not be greater, the Supreme Court gave corporations full license to exercise 'Free speech' during campaign season. The author and his respondents debate the most effective response to the 2010 Citizens United ruling, which, the author...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Energy Innovation At Scale

    The United States urgently needs a transformation of its energy supply both to address climate change and for reasons of energy security. To meet this immense challenge, the nation requires not just technological breakthroughs, but heavy lifting from big industry as well as government guidance, says the author.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    TV Or Not TV: That?s Not The Question

    While the moderator cites evidence that traditional TV viewing is alive and well, her panelists line up to describe a TV industry under siege by digital competitors, and in the throes of major change. In the course of this session, this focuses on how television engages a young(er) audience, a...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Washington Rules: America's Path To Permanent War

    Washington stubbornly sticks to national security policies that don't work, are devoid of moral considerations, sap the Treasury and rob future generations, says the author. In a brief talk that leads to a candid and sometimes impassioned give and take with his audience, the author describes a national security consensus...

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    Disrupting Class: How Disruptive Innovation Will Change The Way The World Learns

    The author describes how the idea of disruptive innovation, developed by management researcher and author Clayton M. Christensen, can provide a fresh perspective on struggling education systems, and perhaps offer some solutions. Business history, the author tells his audience, is littered with cases of unlikely triumphs, when a smaller firm...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    International Media Flows: Global Media And Culture

    The moderator introduces five graduates of the Comparative Media Studies Program - in this final webcast, who share their views and experiences about the international/global dimension of the program. 'Comparative' can be interpreted across time - media through history, media in times of transition or across media - across platforms,...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Creativity And Collaboration In The Digital Age

    In a panel moderated by the presenter of this webcast, five former Comparative Media Studies (CMS) students discuss their personal experiences within the CMS program and the impact it has had on their understanding, interpretation, and implementation of creativity in the digital age.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    Visual Overviews For Cultural Heritage: Interactive Exploration For Scholars In The Humanities, Arts, And Beyond

    A focus on designing technologies that allow the "Visualization of things not visible" has been at the center of the presenter's work over the past two decades. The presenter advocates the discovery of temporal patterns, relationships and clusters via an empowering user experience which enables discovery at a customizable pace...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2010

    Innovation In Energy Storage: What I Learned In 3.091 Was All I Needed To Know

    In a lecture that could have been titled, Better Education through Chemistry, the author begins with solar energy, grid-level storage, and liquid metal batteries and moves into education innovation, sharing creative ways to teach chemistry.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    Humanistic Approaches To The Graphical Expression Of Interpretation

    It is in sharp contrast to a period of enlightenment and empirical science that a re-humanization of digital activities may now take place, says the author. Humanistic approaches are the motif against which she frames her assertion that "Interpretation" introduces an epistemological shift - which she identifies by the rubric...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2010

    Capitalism 3.0: An Institutional Revolution In The Making

    The author points to what he calls a "Blind spot" in contemporary leadership research: the organization and management of attention. The author argues that there are different kinds of awareness or attentiveness, that different problems require different qualities of or approaches to awareness.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2010

    Shaped By Booms And Busts: How The Economy Impacts CEO Management Style

    If you read the press or talk to practitioners, according to the author, the worst thing for an entrepreneur [is] to be one who grew up in a boom time. These entrepreneurs never learn to manage finances or build efficient firms because they're so used to having ample availability of...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2010

    MIT?s Entrepreneurial Development And Impact Over The Past 50 Years

    The author reviews the effects of entrepreneurship within MIT and the relation of MIT entrepreneurship to larger communities. The webcast polled MIT alumni about companies they had started or co-founded and which were still in business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Denialism: Media In The Age Of Disinformation

    A few hundred years after the Enlightenment, western civilization is rushing back to the Dark Ages. The causes are debatable, but, argue these science journalists, the public increasingly rejects the findings of science, from climate change to evolution, and is turning away from rationality and reason in general.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Transportation, The Built Environment And Greenhouse Gas Emissions In Developing Cities

    It seems that income and travel are inextricably linked. As communities gain wealth and prosperity, their travel footprint increases. Global population is projected to increase by nearly 2 billion people by 2030. If this newly added population drove just 3,000 kilometers a year, they would emit more tonnes of C02...

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    The Interaction Between Poverty, Growth And Democracy

    The presenter has remained a passionate advocate of reform since departing the presidency of Peru in 2006. In his home country, the presenter embodied the possibility of transformation, having risen from poverty in an Andean village to top political power, where he initiated a process of economic and social change...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Civics In Difficult Places

    Moderator wonders if these new digital forms are fundamentally liberating, providing users access to public spaces they might otherwise be denied. Moderator pursues this line of inquiry in a series of internet conversations with correspondents covering some of the world's most ravaged or oppressed regions.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Economic Policy Challenges: Microeconomics And Regulation

    Given its contributions to policy and practice in such key sectors as health care, industrial organization and technological innovation, and energy and the environment, microeconomics may not be getting the kind of respect, or at least attention, it deserves, the authors suggest.

    Provided By Massachusetts Institute of Technology