Added 10 months ago | 00:41:06 | 1490 views
On March 30, 2011, Google announced Kansas City, Kansas, would be the first community where 1,000 Mbps broadband network access would be deployed. Google’s fiber-to-the premises services in the United States aims to provide broadband in...
Added 10 months ago | 01:01:44 | 574 views
Asif Iqbal, SDM '11 Power and Performance Program Manager, Apple Inc. Date: February 10, 2014 About the Presentation: The security threats to critical hardware- and software-based infrastructure are greater than ever, no matter w...
Added 1 year ago | 00:03:36 | 1121 views |
Spam – unwanted, unsolicited email – can infect your computer with viruses, put your personal information at risk, and slow your bandwidth. Learn the telltale signs of spam and how to work with Spam Quarantine (the filtering software use...
Added over 1 year ago | 00:59:06 | 1088 views
About the Presentation Cyber espionage and cyber attacks are just two of the innumerable threats facing enterprise networks as a result of the ever-evolving technical landscape. Reasons include: wireless and cloud domains that ...
Added over 1 year ago | 01:41:22 | 1400 views
Presentations by Elaine Mello on the following topics: - Upgrading to HD - what AMPS is doing at MIT regarding upgrades to distance learning classrooms (as well as incorporating Webex capability in addition to video conferencing in th...
Added over 1 year ago | 00:51:53 | 1314 views
About the Presentation Any time confidential information is aggregated or stored on the Internet, there is an expectation of data privacy. This expectation may come from end users whose personal, financial, healthcare, and other sensiti...
Added over 1 year ago | 01:01:10 | 1169 views
About the Presentation Cloud computing is a disruptive technology that is emerging with new opportunities. Companies that move to the cloud can save both time and money. This webinar will provide: An introduction to several ...
Added over 1 year ago | 01:02:55 | 1511 views
About the Presentation Many modern systems are so large that no one truly understands how they work. Because these systems exceed the bounds of human understanding, different design teams must work on separate chunks, glue their work t...
- Architecture & Planning
- Diversity & Inclusion
- Finance & Economics
- Global Awareness & Action
- How To
- Humanities, Arts and Social Sciences
- International Affairs
- Just for Fun/Humor
- Life at MIT
- MIT Alum
- National Security
- Public Policy
- Videoblogging or Autobiographical