Added 8 months ago | 00:08:37 | 397 views
This multidisciplinary workshop convenes activists and scholars working on issues relating to human trafficking, sexual exploitation of domestic minors, labor, and migration in the United States. Bringing together anti-trafficking advoc...
Added 9 months ago | 00:00:00 | 726 views
MIT's free mobile app includes a campus map, shuttle schedules, tours, current events, and more. And it's easy to install, whether you use an iPhone / iPad, Android device, or Blackberry, Windows, or other smartphone.
Added 9 months ago | 01:51:54 | 1152 views
Whenever your “information device”… computer, pad computer, smart phone, video streaming device, etc. … is connected to a network of any sort… home network, office network, the internet, etc. … by ...
Added 11 months ago | 00:03:33 | 837 views |
Does your laptop or desktop computer contain sensitive data, such as Social Security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? If so, MIT policy and Massachusetts r...
Added 1 year ago | 01:27:49 | 16600 views
Date: Monday, November 19, 2012Time: 6:00 pm - 7:30 pmPlace: 32-141, MIT Stata Ctr, 32 Vassar St, CambridgeTitle: THE GOVERNMENT IS PROFILING YOUSpeaker: William Binney, Former National Security Agency, Technical Director of the World Ge...
Added 1 year ago | 01:13:12 | 677 views
There has been some interest expressed on technologies that are being used out in the Higher Ed space, so we will be having three products companies present for us to open us some ideas and discussions. The first presentation will be fr...
Added 1 year ago | 00:03:46 | 1682 views
Malware is short for "malicious software." It includes viruses and spyware that get installed on your computer or mobile device without your consent. These programs can cause your device to crash and can be used to monitor and control yo...
Added 1 year ago | 00:54:42 | 1283 views
About the Presentation Managing a network platform business can be a complex proposition for the platform owner due to various intricacies that are associated with it. These platforms have distinct users, each having exclusive needs and...
Added 1 year ago | 00:55:08 | 1154 views
About the Presentation Why do some new technologies become dominant while others fail or coexist with the old? We explore this question by first developing model-driven theory using a comprehensive system dynamics model of technology an...
- Architecture & Planning
- Diversity & Inclusion
- Finance & Economics
- Global Awareness & Action
- How To
- Humanities, Arts and Social Sciences
- International Affairs
- Just for Fun/Humor
- Life at MIT
- MIT Alum
- National Security
- Public Policy
- Videoblogging or Autobiographical