Search results “An introduction to contemporary cryptology”
Kim, Myungsun (SNU) / Contemporary cryptography introduction / 2010-08-02
2010 Summer Workshop for Young Mathematicians in Korea
Views: 2 Mathnet Korea
Contemporary Sociology - Heidegger: From Phenomenology to Ontology - Lecture 1
Course: Contemporary Sociology Theory - WEEK 13 - Heidegger: From Phenomenology to Ontology - 1 Instructor: Assoc. Prof. Erdoğan Yıldırım For Lecture Notes: http://ocw.metu.edu.tr/course/view.php?id=249 Middle East Technical University OpenCourseWare: [ http://ocw.metu.edu.tr ] Youtube Channel: [ http://www.youtube.com/METUOpenCourseWare ]
Views: 962 METUOpenCourseWare
Cyclic Groups  (Abstract Algebra)
Cyclic groups are the building blocks of abelian groups. There are finite and infinite cyclic groups. In this video we will define cyclic groups, give a list of all cyclic groups, talk about the name “cyclic,” and see why they are so essential in abstract algebra. If​ ​you​’d​ ​like​ ​to​ ​help​ ​us​ ​make​ ​videos more quickly,​ ​you​ ​can​ ​support​ ​us​ on ​Patreon​ at https://www.patreon.com/socratica We​ ​also​ ​welcome​ ​Bitcoin​ ​donations!​ ​​ ​Our​ ​Bitcoin​ ​address​ ​is: 1EttYyGwJmpy9bLY2UcmEqMJuBfaZ1HdG9 Thank​ ​you!! ************** We recommend the following textbooks: Dummit & Foote, Abstract Algebra 3rd Edition http://amzn.to/2oOBd5S Milne, Algebra Course Notes (available free online) http://www.jmilne.org/math/CourseNotes/index.html ************** Be sure to subscribe so you don't miss new lessons from Socratica: http://bit.ly/1ixuu9W You​ ​can​ ​also​ ​follow​ ​Socratica​ ​on: -​ ​Twitter:​ ​@socratica -​ ​Instagram:​ ​@SocraticaStudios -​ ​Facebook:​ ​@SocraticaStudios ******** Teaching​ ​Assistant:​ ​​ ​Liliana​ ​de​ ​Castro Written​ ​&​ ​Directed​ ​by​ ​Michael​ ​Harrison Produced​ ​by​ ​Kimberly​ ​Hatch​ ​Harrison
Views: 141491 Socratica
Inspiration Session: (MSc Information Security) RIM's Blackberry dilemma
Prof. Keith Martin, Director of the Information Security Group & Professor of Information Security, Royal Holloway, University of London delivers our latest academic inspiration session for the MSc in Information Security. He discusses Research in Motion's (RIM) blackberry dilemma regarding the challenges of encryption and national security. For more information on this course please visit: http://www.londoninternational.ac.uk/infosec/
Views: 11371 University of London
Public, Private, Secret: An Introduction from Charlotte Cotton
Public, Private, Secret is the premiere exhibition at the new ICP Museum, located at 250 Bowery. Organized by Curator-in-Residence, Charlotte Cotton, with ICP Associate Curator Pauline Vermare and Assistant Curator Marina Chao, the debut show and events program explore the concept of privacy in today’s society and studies how contemporary self-identity is tied to public visibility. This thought-provoking exhibition presents a wide range of historical and contemporary works by artists including Zach Blas, Martine Syms, Natalie Bookchin, Cindy Sherman, Nan Goldin, and Andy Warhol. Streams of real-time images and videos from various social media sources—curated with Mark Ghuneim and ICP’s New Media Narratives students—sharpen and heighten attention towards the social implications of our image-centric world. The Public, Private, Secret exhibition website is an integral part of the show experience, home to interviews with artists and curators and essays related to the exhibition’s themes, as well as images of works in the exhibition, a schedule of upcoming events, transcripts of past events, and press.
60SMBR: a Friendly Intro to Number Theory
a sixty second math book review of "a friendly introduction to number theory" by Joseph H. Silverman, third edition. twitter: @leibnizwasfirst patreon : www.patreon.com/bootstobooks
Views: 144 BootsToBooks
Introduction to Voting Theory and Preference Tables
This video introduces voting theory and explains how to make a preference table from voting ballots. Site: http://mathispower4u.com
Views: 3302 Mathispower4u
3 core principles of modern security
This is the second video of the Web Security Explained series. It introduces the 3 core principles of modern security. It also gives two useful tips on making your server hard to hack - also known as server hardening. It is meant to be an introduction of the topics, not a technical step by step "how-to".
Smart Cards  / Smart Cards  Securit
TO USE OR PRINT this presentation click : http://videosliders.com/r/1372 ============================================================== Smart Cards Security & Applications ,Outline What is a smart card ? History & Contemporary Usage of Smart Cards. Types of Smart Cards Advantages Smart Card & System Components Biometrics Security Applications ,What is a Smart Card ? A plastic card which contains CPU, ROM, RAM, E2PROM It has I/O and processing capability. Of 6-8 contacts, 6 connected to the chip. These are Vcc, Vpp, Ground, Clock, Reset, Serial I/O. ,History Speculations about the first Smart card. 1968 - The idea of using plastic cards as the carrier for microchips was developed by Jergen Dethloff. 1970 - The first smart cards were introduced in Japan. 1974 - First patent by Roland Morena. 1979 - Motorola produced a smart card with a chip. 1984 - Microchips on Visa debit cards in France. 1990 - Philips offer 512 bit RSA signature in 1.5 sec. 1993 - France mandated microchips on all bank cards. ,History (cont’d) 1995 - Korea issues 1.5 million contactless smart cards for public transportation. 1996 - At the Atlanta Olympics, athletes, team members, and staffs were issued with contactless smart cards containing their identification number, biometrics, etc. 1996 - SGS Thompson offers RSA in 60 ms. 1997 - MS plans smart card login support for Win 98/NT 5.0. ,Current Trends and Issues Europe currently accounts for around 80% of the smart card market, with 16% in Asia, 3% in North America. Several Asian countries have large smart card projects. Even in North America around 5 million cards were issued in 1996. 500 million cards in 1996, 2.5 billion in 2000. Telephone cards is currently the largest application. ,Current Trends and Issues (cont’d) Millions of Unit/Year ,Manufacturers Motorola - MSC0402 ROM 23K E2PROM 8K RAM 384 Bytes RNG Hitachi- H8/300 ROM 16K E2PROM 8K RAM 512 Bytes 2 I/O ports Others Japan : NEC, Toshiba, Oki. US : Texas Instruments, Atmel, Catalyst SGS-Thompson (France), Philips (Netherlands), Siemens (Germany). ,Not every Smart Card is Intelligent ! Memory Cards contain a memory with a fixed logic that enables to read from and write to this memory. Cards, that use microcomputer ICs, are more commonly known as Smart Cards or Chip Cards. Chip Cards are active devices. ,Types of Smart Cards Contact Cards must be inserted into a reader Contactless Cards powered by an RF signal using inductive coils. Combi Cards can be powered by insertion or RF. ,Advantages Cannot be easily duplicated, Tamper proof due to hardware technology, Has processing power, Incorporate cryptographic techniques, Provide interactive authentication, Flexible storage for biometrics, identification, Organized information, ,Advantages (cont’d) Fraud reduction, High memory capacity, Paperless transactions, Convenience. ,Problems Possible usage/registration fees, Lack of internationally accepted standards, Liability issues if card is lost/stolen/misused, Downloading control, System designers are not well informed about how to make use of the cryptographic products, Inter-process protection in multi-application cards. Contact/contactless cards. ,Problems (cont’d) The difficulty of single terminal accepting all cards due to many card issuers and schemes. Because of patents it is difficult to enter smart card market especially for chip and card manufacturers. Multi-functionality issues. ,Inside the Smart Cards BUS CPU MEMORY CLOCK PROTECTION RESET I/O ,Smart Card Components Carrier - PVC, PETP. Chip Low-powerCMOS technology, operating at voltages between 2.2V and 5.5V: chips operating down to 1.5V and below are being designed. 1 micron is now common, 0.2 micron is aimed Microprocessor 8 bit, Motorola 6805, Intel 8051 based. Clock speed up to 5 MHz. 16 bit processors are used in some newer chips. ,Smart Card Components (cont’d) Microprocessors (cont.) RISC microcontrollers are available for smart cards Coprocessors Multiprecision arithmetic operations (multiplication and exponentiation). DES enc
Views: 2954 slide show me
Network Security - Vulnerabilities and Threats
Fundamentals of Computer Network Security Launch you career in cyber security. This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications, Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security Analyst. Course 1 - Design and Analyze Secure Networked Systems University of Colorado System About this Course In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our systems and show the proper way to verify their integrity and authenticity. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes. On Amazon Cloud instances, we will use GnuPG software to generate public/private key pair for signing/verifying documents and open source software, and for encrypting documents. We will learn how to publish software, the related signature and release key on web server and publish public key to PGP key server for others to retrieve. We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications. Module 1 - Cybersecurity Concepts and Security Principles In this module, we will introduce the basic cyber security concepts, enable you to identity root causes of vulnerabilities in a network system and distinguish them from the threats from both inside and outside. We will analyze the enabling factors of recent cyber attack incidences and discuss the basic security services for their defense and triage. We will introduce the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure the computer systems. Trust is critical and in the center of any secure systems. We will examine the source and authenticity of the programs and data installed in systems we used daily and show the proper way to check their integrity, and verify their authenticity. Learning Objectives • Judge vulnerabilities and threats • Apply security analysis to cyber security incidences using method, opportunity, and motive • Apply Confidentiality, Integrity, and Availability (CIA) basic services to analyze and design secure networked systems • Apply Risk Managment Framework (RMF) to reduce the risks of systems • Apply basic security design principles to reduce the system risks and derive protection requirements
Views: 5789 intrigano
Stream Ciphers
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
Views: 7314 nptelhrd
18. Complexity: Fixed-Parameter Algorithms
MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: Erik Demaine In this lecture, Professor Demaine tackles NP-hard problems using fixed-parameter algorithms. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 1230 MIT OpenCourseWare
Chapter 3, part 4: Symmetric Key Crypto --- block ciphers, DES
Information Security: Principles and Practice, 2nd edition, by Mark Stamp Chapter 3: Symmetric Key Crypto Section 3.3.2 block ciphers, DES Class Lecture, 2011
Views: 21130 Mark Stamp
key distribution problem in cryptography
Data sharing problems in cryptography
Views: 4948 nirmal jeyaraj
NCMT 500-117 - Infrastructural Intelligence: Cryptology & the History of Technology
The New Centre for Research & Practice is a Non-profit higher-education institution providing graduate-level seminars in philosophy, art & curatorial practice, media & technology as well as transdisciplinary studies. Become a Member of The New Centre to access the rest of the sessions & the full archive of our past seminars from 2014 onwards. To learn more about Membership and subscribe, please visit: https://thenewcentre.org/membership/member ////////////////////////////////////// DESCRIPTION:This course explores the infrastructuralization of artificial intelligence techniques including deep learning and convolutional neural networks along with the autonomization of capitalist processes in tools and entities like blockchain, DAO and Ethereum. By approaching them in the context of their cultural, philosophical, political, social, economic, and ecologic entanglements, students will gain a much more critical perception of the potential implications they carry than they might otherwise encounter. Of course, technological infrastructures have long become ecological both in terms of material needs requiring a restructuring of old and establishment of new infrastructures (such as rare earth mineral mining, transport, recycling, waste, etc.), and through which the Anthropocene has long become the Technocene. The ubiquity and behavior of these infrastructures both in IoT objects, as well as distributed systems, has been modeled after the techno-ecologic thought of the Baroque and Cybernetics and are thus in critical need of analysis. From institutional critique to infrastructural critique, the course develops countertactics in theory and practice, while closing with a hands-on cryptology workshop (PGP, TOR, encrypted messaging, introduction to Tails Linux etc.).
Stanford Seminar - Unethical Algorithms of Massive Scale
EE380: Computer Systems Colloquium Seminar Unethical Algorithms of Massive Scale: New Data, a New Discovery, a New Tracking System, and a New Organization Speaker: Robert Epstein, The Sunlight Society and The American Institute for Behaviorial Research and Technology The Internet has made possible new means of manipulating opinions, purchases and votes that are unprecedented in human history in their effectiveness, scale and clandestine nature. Whether closely guided by human hands or operating independently of their creators, these algorithms now guide human decision making 24/7, often in ways that have ethical consequences. Biased search rankings, for example, have been shown to shift the voting preferences of undecided voters dramatically without any awareness on their part that they are being manipulated (the Search Engine Manipulation Effect, or SEME). Recent research shows that SEME can impact a wide range of opinions, not just voting preferences, and that multiple searches increase SEME's impact. New experiments also help to explain why SEME is so powerful and demonstrate how SEME can be suppressed to some extent. In 2016, new research also demonstrated that search suggestions (in "autocomplete") can also be used shift opinions and votes (the Search Suggestion Effect, or SSE). Demonstrating these possibilities in research is one thing; do search engine companies actually show people search suggestions or search results that are biased in some way? In 2016, AIBRT researchers recruited a nationwide network of field agents whose election-related searches were collected and aggregated for six months before the November election, thus preserving 13,207 searchers and the 98,044 web pages to which the search results linked. This unique data set revealed that that search results were indeed biased toward one candidate during most of this period in all 10 search positions on the first page of search results - enough, perhaps, to shift millions of votes without people's knowledge. Based on the success of this tracking effort, in early 2017, experts in multiple fields and at multiple universities in the US and Europe came together to creates The Sunlight Society (http://TheSunlightSociety.org), a nonprofit organization devoted to creating a worldwide ecosystem of passive monitoring software that will reveal a wide range of online manipulations as they are occurring, thus providing a means for identifying unethical algorithms as they are launched. About the Speaker: Robert Epstein is Senior Research Psychologist at the American Institute for Behavioral Research and Technology (AIBRT) in Vista, California, as well as the former editor-in-chief of Psychology Today magazine and the founder and director emeritus of the Cambridge Center for Behavioral Studies. A Ph.D. of Harvard University, he has published 15 books on artificial intelligence, creativity, stress management, and other topics, as well as more than 250 scientific and popular articles in publications such as Science, Nature, Psychological Science, TIME, Discover, U.S. News & World Report, and Scientific American Mind, where Dr. Epstein is a contributing editor. Dr. Epstein is also the founding director of the Loebner Prize Competition in Artificial Intelligence, an annual Turing Test that has been conducted since 1990. A thought leader in the behavioral sciences, Dr. Epstein is interviewed by journalists between 50 and 100 times a year. You can follow him on Twitter at @DrREpstein. For more information, see http://drrobertepstein.com . For more information about this seminar and its speaker, you can visit http://ee380.stanford.edu/Abstracts/170607.html Support for the Stanford Colloquium on Computer Systems Seminar Series provided by the Stanford Computer Forum. Colloquium on Computer Systems Seminar Series (EE380) presents the current research in design, implementation, analysis, and use of computer systems. Topics range from integrated circuits to operating systems and programming languages. It is free and open to the public, with new lectures each week. Learn more: http://bit.ly/WinYX5
Views: 2816 stanfordonline
What was Fermat’s “Marvelous" Proof? | Infinite Series
Viewers like you help make PBS (Thank you 😃) . Support your local PBS Member Station here: https://to.pbs.org/donateinfi If Fermat had a little more room in his margin, what proof would he have written there? Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Resources: Contemporary Abstract Algebra by Joseph Gallian https://www.amazon.com/Contemporary-Abstract-Algebra-Joseph-Gallian/dp/1133599702 Standard Definitions in Ring Theory by Keith Conrad http://www.math.uconn.edu/~kconrad/blurbs/ringtheory/ringdefs.pdf Rings and First Examples (online course by Prof. Matthew Salomone) https://www.youtube.com/watch?v=h4UCMd8dyiM Fermat's Enigma by Simon Singh https://www.amazon.com/Fermats-Enigma-Greatest-Mathematical-Problem/dp/0385493622 Who was first to differentiate between prime and irreducible elements? (StackExchange) https://hsm.stackexchange.com/questions/3754/who-was-first-to-differentiate-between-prime-and-irreducible-elements Previous Episodes: What Does It Mean to be a Number? https://www.youtube.com/watch?v=3gBoP8jZ1Is What are Numbers Made of? https://www.youtube.com/watch?v=S4zfmcTC5bM Gabe's references from the comments: Blog post about the Peano axioms and construction of natural numbers by Robert Low: http://robjlow.blogspot.co.uk/2018/01/whats-number-1-naturally.html Recommended by a viewer for connections to formulation of numbers in computer science: https://softwarefoundations.cis.upenn.edu/ In 1637, Pierre de Fermat claimed to have the proof to his famous conjecture, but, as the story goes, it was too large to write in the margin of his book. Yet even after Andrew Wiles’s proof more than 300 years later, we’re still left wondering: what proof did Fermat have in mind? The mystery surrounding Fermat’s last theorem may have to do with the way we understand prime numbers. You all know what prime numbers are. An integer greater than 1 is called prime if it has exactly two factors: 1 and itself. In other words, p is prime if whenever you write p as a product of two integers, then one of those integers turns out to be 1. In fact, this definition works for negative integers, too. We simply incorporate -1. But the prime numbers satisfy another definition that maybe you haven’t thought about: An integer p is prime if, whenever p divides a product of two integers, then p divides at least one of those two integers. Written and Hosted by Tai-Danae Bradley Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow and Linda Huang Made by Kornhaber Brown (www.kornhaberbrown.com) Special thanks to Roman Pinchuk for supporting us on our Converse level on Patreon. Along with thanks to Matthew O'Connor, Yana Chernobilsky, and John Hoffman who are supporting us on Patreon at the Identity level! And thanks to Mauricio Pacheco who are supporting us at the Lemma level!
Views: 71801 PBS Infinite Series
Probability explained | Independent and dependent events | Probability and Statistics | Khan Academy
We give you an introduction to probability through the example of flipping a quarter and rolling a die. Practice this lesson yourself on KhanAcademy.org right now: https://www.khanacademy.org/math/probability/independent-dependent-probability/basic_probability/e/dice_probability?utm_source=YT&utm_medium=Desc&utm_campaign=ProbabilityandStatistics Watch the next lesson: https://www.khanacademy.org/math/probability/independent-dependent-probability/basic_probability/v/probability-space-exercise-example?utm_source=YT&utm_medium=Desc&utm_campaign=ProbabilityandStatistics Probability and statistics on Khan Academy: We dare you to go through a day in which you never consider or use probability. Did you check the weather forecast? Busted! Did you decide to go through the drive through lane vs walk in? Busted again! We are constantly creating hypotheses, making predictions, testing, and analyzing. Our lives are full of probabilities! Statistics is related to probability because much of the data we use when determining probable outcomes comes from our understanding of statistics. In these tutorials, we will cover a range of topics, some which include: independent events, dependent probability, combinatorics, hypothesis testing, descriptive statistics, random variables, probability distributions, regression, and inferential statistics. So buckle up and hop on for a wild ride. We bet you're going to be challenged AND love it! About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to KhanAcademy’s Probability and Statistics channel: https://www.youtube.com/channel/UCRXuOXLW3LcQLWvxbZiIZ0w?sub_confirmation=1 Subscribe to KhanAcademy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 3604756 Khan Academy
e-Security: Introduction
Views: 367 Bill Buchanan OBE
NCPT 750-1115 The Horror of Security: Contemporary Geopolitics in a Permanent Beta Phase
The New Centre for Research & Practice is a Non-profit higher-education institution providing graduate-level seminars in philosophy, art & curatorial practice, media & technology as well as transdisciplinary studies. Become a Member of The New Centre to access the rest of the sessions & the full archive of our past seminars from 2014 onwards. To learn more about Membership and subscribe, please visit: https://thenewcentre.org/membership/member ////////////////////////////////////// Contemporary geopolitics as curated by the United States is in a permanent beta phase. Neuro-torture, algorithmic warfare, drones strikes, cybernetic nation-building are not means or ends but tests. Can a polis be engineered? Can the human operating system be reformatted? Can violence be modulated until legally invisible while all the more lethal? Each incursion, each new actor or actant, new terrains from brains to transatlantic cables, all find themselves part of a grand experiment. Over the course of this seminar we will explore how classically Realist concepts of order and national interest have been subtly displaced by subterranean violence entrepreneurs that populate the transversal battlefield of security politics. Doomsayers like Paul Virilio, Lewis Mumford, and Martin Heidegger who foretold a kind of terminal and self-annihilating velocity of security's technological saturation are today being shown to have been optimists. Security doesn’t know totality or finality: it bleeds, mutates, and reforms. Furthermore the peril of biopolitics seems now almost romantic. The care and concern for life’s productivity is increasingly subsumed by plasticity—forming and reforming without regard to the telos of productivity, division, or normative order. There are of course orders in our geoplastic age but they are almost unrecognizable as such when so many are directly invested in the intensifying failure of publically-stated strategic ends. In an attempt to confront the particular differences that mark our historical moment we will explore thinkers and practices that organize violence and pain beyond the limits of identity and mortality. We are witnessing creative and horrifying experiments in the affirmative production of dying that also deprive those targeted, in some cases whole population, from the relief of death. The horror of security politics is not tragic. Tragedy redeems. The horror of contemporary security politics is precisely that there is no relief, no reason, no victory, no defeats, no exit. Throughout this seminar, therefore, we will explore the problem of life and identity in the age of sustainable warfare.
When dance and science meet: Karine Rathle at TEDxLSE 2013
Karine Rathle is a dancer, teacher, choreographer and dance scientist with experience in ballet, contemporary dance, contact improvisation, Pilates, Somatics, Argentinean tango and folkloric dance. She has extensive experience working as a teacher and rehearsal director with dancers in Canada, Argentina and the UK. After the completion of an MSc Dance Science at Trinity Laban Conservatoire of Music and Dance, she also works as a researcher applying science to help enhance dancers' performance health and well-being. Karine's creative work is fueled by an interest in developping a multidisciplinary, personal and authentic language. Extending beyond the perceived limits of the physical, Karine's voyage of discovery aspires to integrate the movement, the image and the theatrical aspect in both her creation, and her performance of dance. In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)
Views: 18235 TEDx Talks
Film Appreciation 2015: Lecture 2: Key Concepts, Part 1
Welcome to the Film Appreciation Course offered as part of the NPTEL. Conducted by Professor Aysha Iqbal, Professor at the Department of Humanities and Social Sciences, IIT, Madras, the course promises to take the participant through major cinematic movements, and introduce them to key aspects of aesthetics and techniques. For more details, visit http://nptel.ac.in
Views: 4937 Film Appreciation
NCCP 700-916: Contemporary Readings of Hegel
The New Centre for Research & Practice is a Non-profit higher-education institution providing graduate-level seminars in philosophy, art & curatorial practice, media & technology as well as transdisciplinary studies. Become a Member of The New Centre to access the rest of the sessions & the full archive of our past seminars from 2014 onwards. To learn more about Membership and subscribe, please visit: https://thenewcentre.org/membership/member ////////////////////////////////////// Hegel famously characterized philosophy as its own time comprehended in thought. Today, 185 years after Hegel’s death, several contemporary philosophers have enlisted Hegel in their attempts to comprehend our time in thought. What is striking however is that these philosophers invoke Hegel as the inspiration for radically antagonistic comprehensions of our present. Since the spontaneous comprehension of our present is as a time of catastrophic crisis it is unsurprising that the comprehension of crisis should be riven by a crisis of comprehension. The power of Hegel’s thought, and its contemporary salience, so this course will argue, is that crises of comprehension must yield comprehensions of crisis that obligate their critical overcoming. The necessity at issue is rational and it is precisely the status of rational necessity that is at stake in these antagonistic reactivations of Hegel. The claim that Hegelian rationalism is committed to converting crises of comprehension into their comprehensive overcoming will be tested against those who emphasize the conciliatory, integrative aspect of Hegel’s rationalism at the expense of traumatic discontinuities, but also against the attempt to convert Hegel’s thought into a tragic meditation on the impossibility of rationally overcoming trauma. We will trace the schism between these integrative and disintegrative reactivations of Hegel back to conceptual issues about the status of rationality, metaphysics, critique, dialectics, and the absolute in Hegel’s thought. We will also try to understand how these conceptual antagonisms give rise to fundamental political antagonisms, not only between social democratic reformism and revolutionary communism, but also between communism as a possible object of affirmation and communism as an impossible lost object of mourning.
PIONEERS: Gregory Chaitin: Against Method - TRAILER
Gregory Chaitin (b. 1947) is a mathematician, an expert in complexity. Already as a young prodigy he contributed greatly to the philosophy of mathematics and computer science. Chaitin states that although there are truths in science that cannot be proven, there is reason for huge optimism. This natural born rebel has been recently constructing a theory of the source of beauty and creativity in nature. The new theory that he calls metabiology. We’re meeting Gregory and Virginia – his wife, his muse, his intellectual partner and scientific collaborator – at the tiny Brazilian island of Paqueta, their philosophical retreat. Against Method is an episode of the Pioneers series, the unique documentary film project devoted to the most unorthodox contemporary thinkers who challenge current paradigms and go against the “publish or perish” decree. Thrills, joys, and sorrows of exploring frontiers of the known and the unknown – this is what the series of moving encounters is about. More: "http://pioneers-series.com" Other Pioneers (so far): Daniel C. Dennett: “https://youtu.be/fq2XAjDXjEg” Julian Barbour: “https://youtu.be/A8nmRNZMn7Y” Freeman Dyson: “https://youtu.be/oLJ1fNw10WU” Charles H. Bennett: “https://youtu.be/98_jW8-SLII” Artur Ekert: “https://youtu.be/FBFCFg0e5Ec” Roy Glauber: “https://youtu.be/7xDF9_T6UFc”
Views: 289 Karol Jalochowski
2017 NAIC, Stanford Cybersecurity Forum: Panel 1
Session Title: Understanding Current Insurance Coverages for Cyber Risks. On Oct. 11, 2017, the National Association of Insurance Commissioners (NAIC) and Stanford University's Cyber Initiative sponsored a joint program to help policymakers and the public better understand cyber threats and the critical role played by cyber insurance in addressing these risks. This forum was held at the Santa Clara Convention Center in Santa Clara, Calif.
Views: 690 NAIC News
Classical Ciphers and Symmetric Key Ciphers (ITS335, Lecture 3, 2013)
Caesar, rail-fence and vigenere ciphers, one-time pad, frequency analysis; Symmetric ciphers including DES and AES. Lecture 3 of ITS335 IT Security at Sirindhorn International Institute of Technology, Thammasat University. Given on 19 November 2013 at Bangkadi, Pathumthani, Thailand by Steven Gordon. Course material via: http://sandilands.info/sgordon/teaching
Views: 3190 Steven Gordon
At Escapology Orlando An Escape Room - Did We Make It Out Alive?!? (2.3.2016)
TheTimTracker T-Shirts are now available at www.thetimtracker.spreadshirt.com If you want more info about Escapology check out their website here! http://www.escapology.com/orlando We finally got a PO Box! PO Box 536071 Orlando, FL 32853-6071 Hello, I am TheTimTracker. Welcome to my crazy beard and mustache driven life! Come with me as we adventure around Orlando, Florida and explore all of the amazing places that have made Orlando a top tourist destination, and a few that no one knows about! The beautiful blond chick you always see in my videos is my hot wife Jenn. Make sure you say hello and hit the subscribe button, because we are always doing something new. Whether it's home science experiments for kids, roller coaster POV ride alongs or Theme Park Events; you will be sure to have a blast hanging out with us! We also have a skit channel you might enjoy over at http://www.youtube.com/skittyskittybangbang We always have fun filming new things for you guys and showing you things to do in Orlando, Florida!
Views: 46308 TheTimTracker
Cyber Security: Contemporary Issues and Challenges
A One Day National Seminar on “Cyber Security: Contemporary Issues and Challenges” was organized by the Department of Computer Science and Engineering and Department of Electronics and Communication Engineering on 28th August, 2017.
Divine Physics: The Cosmic Lattice: Stoyan Sarg's new model beyond Quantum and Classical Physics
http://thatchannel.com https://www.patreon.com/thatchannel http://www.helical-structures.org Stoyan Sarg has worked in both the Russian and Canadian space agencies, and has been a professor at York University and other universities. Warning against nuclear war, his view of physics cautions that multiple explosions could create a vortex that could drain the Earth's atmosphere and oceans into space, a fate that perhaps affected Mars in the distant past. Stoyan's theory of matter acknowledges "ether" and has a new model for the atom. The treatise BASIC STRUCTURES OF MATTER – SUPERGRAVITATION UNIFIED THEORY (BSM-SG) is based on an original idea about physical vacuum, which has never been investigated before. It follows the recommendation of James Clerk Maxwell expressed in his "A Treatise on Electricity and Magnetism" vol. II, section "A medium necessary": In fact, whenever energy is transmitted from one body to another in time, there must be a medium or substance in which the energy exist after it leaves one body and before it reaches the other... Hence, all these theories lead to the conception of a medium in which the propagation takes place The BSM-SG theory unveils the relation between the forces in Nature by adopting the following framework: - Empty Euclidian space without any physical properties and restrictions - Two super dens fundamental particles able to vibrate and congregate. Their parameters are associated with the Planck’s scale. - A Fundamental law of Super Gravitation (SG) - an inverse cubic law valid in pure empty space. An enormous abundance of these two particles, with energy beyond some critical level, are able to congregate into self-organized hierarchical levels of geometrical formations, based on the fundamental SG law. This leads deterministically to creation of space with quantum properties (known as physical vacuum) and a galaxy as observable matter. All known laws of Physics are embedded in the underlying structure of the physical vacuum and the structure of the elementary particles. The fundamental SG law is behind the gravitational, electric and magnetic fields and governs all kinds of interactions between the elementary particles in the space of physical vacuum. The revealed structures of the physical vacuum and elementary particles with interactions governed by SG law permit analysis of longstanding problems in different fields of Physics (Particle Physics, Quantum mechanics, Relativity and Cosmology) by using a classical approach in a real 3-D Euclidian space. The gravity and the electrical charge are not intrinsic features of the particles, but effects of interaction between particle's structure and the fine structure of the physical vacuum. The magnetism and inertia are specific reaction effects of the physical vacuum in a case of particle motion. The applied original approach permits a deeper insight into lower levels of matter organization, levels below the elementary particles. Any physical phenomenon or unsolved problem could be effectively analyzed at such levels. Every point of space in which we live and observe (down to ~ 1X10-20 m) contains two types of Zero Point Energy (ZPE) - a static and a dynamic one. Presently, the dynamic one is only envisioned by contemporary physics. The observable signature of the dynamic ZPE is the Microwave Cosmic Background temperature of 2.72K. (see the derived results in Chapter 5 of BSM). The hidden static ZPE is much larger and it is a source of the nuclear energy. Divine Physics with Dr. John Stewart (http://www.biophysica.com) and Hugh Reilly 2016-11n-01
Views: 833 ThatChannel.com
1. Pointed Pen Calligraphy 101: About nibs and oblique holders
Tutorial No. 1 covers: Nibs & oblique holder intro Nibs for beginners Flex/Shade/Swell Oblique or straight holder
Radboud Master's programme: Environment and Society Studies
This Master's programme teaches you how contemporary society deals with its physical environment and how you can help enhance sustainability in the economy, society and politics. For more information, please visit http://www.ru.nl/masters/ess.
Views: 2148 Radboud University
CON7631   Finally, the Java EE Security API JSR 375
This session presents the latest status of and plans for the JPA specification; takes a deep dive into the main areas; and describes and discusses new Java SE 8-related additions that have helped achieve better performance, improved user experience, and/or increased quality of code within JPA APIs. It also covers its relationship to Java EE 8 and other standards (JSON, JAX-RS, Bean Validation, CDI...). The session also gives you the opportunity to provide feedback on your specific areas of interest, which is welcome and appreciated. Speaker: Lukas Jungmann, JPA Specification Lead, Oracle Software Engineer with 11 years of experience currently working at Oracle on Java Persistence API specification and its reference implementation
Views: 1401 Oracle Developers
Security Matters Lecture Series: Introduction
International Security in a Changing World is the signature course at the Center for International Security and Cooperation at Stanford University. Now, anyone can join the class and experience what it’s like to attend Stanford lectures by some of the most knowledgeable experts in the field of global security. This series of 30 classroom and office lectures is broken down into 157 shorter clips – at no cost and for curious minds of all ages and professions. This lecture series surveys the most pressing security issues facing the world today. Topics include cybersecurity, nuclear proliferation, insurgency and intervention, terrorism, biosecurity, lessons learned from the Cold War and Cuban Missile Crisis – as well as the future of U.S. leadership in the world.
Introduction to e-Security (CSN11117/CSN11102)
Outline of Weeks 3-5 of CSN11117/CSN11102: http://asecuritysite.com/csn11117
Views: 208 Bill Buchanan OBE
CryptoGame Gameplay Trailer | Interactive Story and Cryptography Tools
"CryptoGame: Personal Edition": Available online as "The CryptoGame" - a cryptography based interactive fiction. Link: http://manansingh.github.io/crypto-game/ "CryptoGame: Server Edition" (for LAN in schools, universities): Contact - Department of Computer Science, Dev Sanskriti Vishwavidyalaya, DSVV, Haridwar, Uttarkhand, India. ABOUT CRYPTOGAME Cryptogame offers two things. One- A suite of 20+ Cryptography related Tools for a broad selection of ciphers - from classical to modern. Two- A text-based interactive storyline which engages the user in a chapter-wise series of cipher challenges, on solving which the player progresses in the story. Purpose: 1. To provide a set of Cryptography tools, using which teachers can demonstrate, and students can practice various cryptography techniques. 2. Engage and entertain the players via a realistic and fascinating storyline, and a set of highly specialized and interconnected cipher challenges. Only-CryptoLab Online Demo, Link: http://manansingh.github.io/Cryptolab-Offline/ Only-Cryptolab Download, Link: https://github.com/mananSingh/Cryptolab-Offline/archive/gh-pages.zip ---------------------------------- Trailer Music: Machinations by Technoillogical.
Views: 207 Manan Singh
Leading in the 21st century: Wharton's Michael Useem on modern leadership
In today's volatile environment, leaders of global organizations must master a slate of challenges unseen in business history. In our new series, "Leading in the 21st century,", McKinsey spoke with seven leaders and Wharton professor Michael Useem, who offered an overview of the leadership challenges facing executives today. In this first segment, he sat down with McKinsey Publishing's Bill Javetski in August 2012 to talk about how traditional leadership qualities have changed in the modern era. Find the full transcript and other interviews in the series at McKinsey's web site: http://bit.ly/Leadership21st The director of the Center for Leadership and Change Management at the Wharton School, University of Pennsylvania, Professor Useem is the the author of, among other books, The Leader's Checklist. He has led leadership programs with dozens of multinational companies and developed a view of leadership that blends the need for fundamentals—vision, strategy, communication skills—with the evolving complexities of a globalizing world in which corporations strive to operate in scores of diverse countries.
Views: 2532 McKinsey & Company
The MMU Side-Channel Attack: it's not a Chip Flaw
These guys figured out how to leverage a fundamental operational characteristic of all modern processor architecture to penetrate the randomization of all Address Space Layout Randomization. This breaks on all contemporary CPU architectures. For the full explanation and episode, visit https://twit.tv/sn600.
P-SPAN #373: "Beyond Computation: The P versus NP Question" lecture by Dr. Michael Sipser
"The Simons Institute for the Theory of Computing, together with the Mathematical Sciences Research Institute (MSRI) and Berkeley City College (BCC) presented a lecture by Dr. Michael Sipser - "Beyond Computation: The P versus NP Question". The event took place on May 9, 2014, at Berkeley City College What are the theoretical limitations of computer power? In a remarkable 1956 letter, the great logician Kurt Gödel first raised this question when he asked the famous mathematician and computer pioneer John von Neumann whether certain computational problems could be solved without resorting to a brute force search through many possibilities. In so doing, he foreshadowed the P versus NP question, one of the major unanswered questions of contemporary mathematics and theoretical computer science. This question asks whether every problem whose solution can be easily verified by a computer can also be easily solved by a computer. An answer to this question would reveal the potential for computers to solve puzzles, crack codes, prove theorems, and optimize many practical tasks.
Views: 451 Peralta Colleges
John Cayley - Reading Unreadable Chinese: A Brief Introduction to Xu Bing's Book from the Sky
John Cayley - Reading Unreadable Chinese: A Brief Introduction to Xu Bing's Book from the Sky. Presentation for the 3rd Language Creation Conference, March 22, 2009.
Contemporary Physics and God - (3 of 7)
Lecture by Dr. Robert J. Spitzer (author of "New Proofs for the Existence of God"). Table of Contents: http://www.youtube.com/view_play_list?p=FC0B6512095D311E
Views: 1828 IDquest
Faith and Science
Prominent clashes — both historical and contemporary — have led to the widely held conclusion that science and religion are fundamentally incompatible. Yet, many scientists practice a traditional faith, having found a way to accommodate both scientific inquiry and religious teaching in their belief system. Other scientists are bringing science to bear on the phenomenon of religion and spiritual belief — neuroscientists are studying what happens in the brain during religious experiences, while anthropologists are investigating how religion is linked to cooperation and community. This program provided an intimate look at what scientists have to say about their religious beliefs and what might be revealed by scientific studies of spirituality. This program is part of the Big Ideas Series, made possible with support from the John Templeton Foundation. The World Science Festival gathers great minds in science and the arts to produce live and digital content that allows a broad general audience to engage with scientific discoveries. Our mission is to cultivate a general public informed by science, inspired by its wonder, convinced of its value, and prepared to engage with its implications for the future. Subscribe to our YouTube Channel for all the latest from WSF. Visit our Website: http://www.worldsciencefestival.com/ Like us on Facebook: https://www.facebook.com/worldsciencefestival Follow us on twitter: https://twitter.com/WorldSciFest Original Program Date: May 31, 2008 Moderator: Bill Blakemore Participants: Lorenzo Albacete, Nina Azari, Paul Bloom, William Phillips Bill Blakemore Introduction 00:29 Participant Introductions 06:36 The facts about God 12:40 What happens in the brain when we think about religion? 15:37 Bill Phillips defines faith 26:54 The God question is an intellectual and conceptual problem 37:20 FMRI shows the experience of religion. 53:30 Atheists and theist agree 01:03:16
Views: 11303 World Science Festival
Martin Parr - Instant Parr
INSTANT PARR is an event-based limited-edition Martin Parr photobook. For one day only, in Tokyo's Paul Smith SPACE, event participants edited and sequenced Parr's photography to generate their own unique photobook. Assembly and binding was conducted inside the event space with the use of several sewing machines. The spine of each book is embellished and sewn with a swatch of original Paul Smith fabric. Signed copies of INSTANT PARR are available for purchase at goliga.com/instant/ Movie directed by Akiko Nishimura.
Views: 7484 GOLIGA
iSchools: Contemporary Information Technology Theory Studies
The perfect merger of academic rigor and contemporary thinking has come together in the concept of iSchools, which give practical consideration and interesting learning opportunities to the most relevant issue of our time: information. So far there are over 50 worldwide iSchools; a global pool, like bitcoin for academia. The March 2014 conference was held in Berlin and the March 2015 conference will be at UC Irvine. With higher education under reinvention pressure from all directions, the possibility of making institutional learning relevant again cannot be underscored enough. iSchools are the perfect venue to take up not just the practical agenda within the information technology field but also the theoretical, philosophical, and societal dimensions of the impact of information technology. There have started to be some conferences regarding ‘big data theory’ (Theory of Big Data, University College London, Jan 2015), and a calling out of the need for ‘big data theory’ (Big Data Needs a Big Theory to Go with It, Scientific American, Rise of Big Data underscores need for theory, Science News). These efforts are good, but mostly concern having theory to explain the internal operations of the field, not its greater societal and philosophical effect. In addition to how ‘big data theory’ is currently being conceptualized, an explicit consideration of the general theoretical and social impact of information technology is needed. Floridi’s distinction re: philosophy of information is apt; the main focus is how the field changes society, not the internecine methods of the field. Research Agenda: Contemporary Information Technology Theory Studies Here is a thumbnail sketch of a research agenda for Contemporary Information Technology Theory Studies. Early examples of topics taken up at institutes and think tanks (like Data&Society) are a good start and should be expanded and included in the academic setting. A more appropriately robust agenda will consider the broad theoretical, social, and philosophical impact of the classes of information technology below that are dramatically reshaping the world, including specifically how our ideas of self and world, and future possibilities are changing. Research agenda: (1) Big Data (big data, smart data, personal data, group data); (2) Blockchain Technology (Institute for Blockchain Studies); (3) The Brain as an Information Technology (computational neuroscience, connectome, in-silico simulation, cognitive enhancement); (4) Smartcity, Connected World, Self-driving Vehicles http://futurememes.blogspot.com/2014/10/ischools-contemporary-information.html
Janelle Monáe - Dirty Computer [Emotion Picture]
Dirty Computer - an emotion picture* by Janelle Monáe. *EMOTION PICTURE (definition): a narrative film and accompanying musical album Dirty Computer: The Album Available Now: https://janellemonae.lnk.to/dirtycomputer Starring Janelle Monáe as Jane 57821 Tessa Thompson as Zen Jayson Aaron as Ché Also Starring Michelle Hart as Virgin Victoria Dyson Posey as Cleaner #1 Jonah Lee as Cleaner #2 Executive Produced by Janelle Monáe Nate “Rocket” Wonder Chuck Lightning Mikael Moore Julie Greenwald Co-Executive Produced by Kelli Andrews Ian Blair Alan Ferguson Directed by Andrew Donoho Chuck Lightning Written by Chuck Lightning Additional Story Ideas and Vision by Janelle Monáe Nate “Rocket” Wonder Alan Ferguson Music Videos Written and Directed by Alan Ferguson Emma Westenberg Andrew Donoho Lacey Duke Produced by Nicole Acacio Ian Blair Associate Produced by Deonna Young-Stephens Music Videos Produced by Justin Benoliel Judy Craig Melissa Ekholm Maya Table Ian Blair Original Music Score by Nate “Rocket Wonder Wynne Bennett Wardrobe by Alexandra Mandalkorn Hair by Nikki Nelms Makeup by Jessica Smalls Director of Photography Todd Banhazl Production Design Fernanda Guerrero Edited by Andrew Donoho Taylor Brusky Music Videos Edited by Deji LaRay Choreography by Jemel McWilliams Sound Design by Jackie! Zhou Janelle Monáe with Special Guest St. Beauty “Dirty Computer” Tour Dates - Just Announced! Visit http://www.jmonae.com for more Mon Jun 11 - Seattle, WA King County’s Marymoor Park Tue Jun 12 - Vancouver, BC Queen Elizabeth Theatre Wed Jun 13 - Portland, OR McMenamins Edgefield Amphitheater Sat Jun 16 - San Francisco, CA The Masonic Wed Jun 20 - San Diego, CA Cal Coast Credit Union Open Air Theatre at SDSU Thu Jun 28 - Los Angeles, CA The Greek Theatre Sat Jun 30 - Salt Lake City, UT The Complex Sun Jul 01 - Denver, CO The Paramount Theatre Tue Jul 03 - Minneapolis, MN State Theatre Thu Jul 05 - Chicago, IL The Chicago Theatre Fri July 06 - Milwaukee, WI* Summerfest* Sat Jul 07 - Grand Rapids, MI 20 Monroe Live Mon Jul 09 - Detroit, MI Fox Theatre Detroit Tue Jul 10 - Cincinnati, OH Taft Theatre Wed Jul 11 - St. Louis, MO The Pageant Fri Jul 13 - Nashville, TN+ Ryman Auditorium+ Sat Jul 14 - Indianapolis, IN Murat Theatre at Old National Centre Mon Jul 16 - Toronto, ON Rebel Wed Jul 18 - New York, NY Hulu Theater at Madison Square Garden Fri Jul 20 - Washington, DC* The Anthem* Sat Jul 21 - Boston, MA Blue Hills Bank Pavilion Mon Jul 23 - Raleigh, NC The Ritz Tue Jul 24 - Charlotte, NC The Fillmore Charlotte Thu Jul 26 - Tampa, FL Jannus Live Fri Jul 27 - Miami, FL The Fillmore Miami at Jackie Gleason Theater Sat Jul 28 - Orlando, FL House of Blues Orlando Sat Aug 04 - Atlanta, GA Tabernacle *non-Live Nation date +on sale beginning May 4 Connect with Janelle: http://jmonae.com http://instagram.com/janellemonae http://twitter.com/janellemonae http://facebook.com/janellemonae
Views: 2243003 Janelle Monáe
Cyber-Terrorism: A Question of Intent
Security expert Brian Snow lays down the uncomfortable truth: The technology exists today for a malicious group to cripple our nation's infrastructure; all they need is the intent. Because it is difficult to predict how an attack will be carried out, he advises the improvement of our security systems, as well as our behavior on the world stage. Watch the Full Program Here: https://youtu.be/nVVF8dgKC38 Original Program Date: June 4, 2011 The World Science Festival gathers great minds in science and the arts to produce live and digital content that allows a broad general audience to engage with scientific discoveries. Our mission is to cultivate a general public informed by science, inspired by its wonder, convinced of its value, and prepared to engage with its implications for the future. Subscribe to our YouTube Channel for all the latest from WSF. Visit our Website: http://www.worldsciencefestival.com/ Like us on Facebook: https://www.facebook.com/worldsciencefestival Follow us on twitter: https://twitter.com/WorldSciFest
Blockchained Your Life_ The TechnoPolitics of Cryptocurrencies
Panel discussion moderated by Rose Regina, Dennis Schep, Luce deLire. Check out the notes and collaborative discussion here: https://medienpad.de/p/BlockchainedYourLife "We are defending our privacy with cryptography, [...]." (Hughes 1993) 1) ''What problem is it that cryptocurrencies try to solve?'' Fasten your seatbelt. In the first part of the event, we will hear about the historical origins and current political trajectories of cryptocurrencies and blockchain technology. We will receive a cryptocurrency crash course. We will engage in a cryptomaterialistic perspective on the metaphysical baggage cryptocurrencies come with. We will contextualize them within a set of larger scale political stakes (property, atheism). We will hear how these issues manifest in technology and its subjects. We will investigate the reinscription of pre-existing dominance and coercion by and through anonymous transaction, the monetization of data and the lack of undo buttons. 2) ''Are these the relevant problems?'' Has 'bitcoin' merely re-invented capitalism? Do 'smart contracts' rewire the notion of property? We will discuss these and whatever else you bring. We hope to come to think of some concrete actions. For this purpose, we might decide to break up into smaller groups. "The point is not to convert the inassimilable into the assimilable [nor to hedge and keep it inassimilable], but to challenge those regimes that require assimilation to their own norms."" (Butler 2012) Rose Regina Lawrence is the Digital Security Coordinator at Tactical Tech, a global non-profit network of activists, technologists and engaged citizens. Dennis Schep is a freelance cultural critic and literary scholar, based in Berlin. Luce deLire is a philosopher, currently on sabbatical from Johns Hopkins University. Part of the transmediale/CTM Vorspiel 2018 festival (vorspiel.berlin) Streamed live from SPEKTRUM Berlin (http://spektrumberlin.de)
Views: 663 Adjy Leak
Encryption Part II: Security on the Web 3
A look at what server administrators should be doing to secure their users' passwords—and how a lot of them AREN'T doing it. UPDATE: Collision found in SHA-1 hashing algorithm: http://thehackernews.com/2017/02/sha1-collision-attack.html Consumer Password Worst Practices: http://www.imperva.com/docs/wp_consumer_password_worst_practices.pdf Salted Password Hashing - Doing it Right: https://crackstation.net/hashing-security.htm Comparing Bank Password Requirements: https://docs.google.com/spreadsheets/d/1Z_qscNYF4fjzKoD79FlRpTV0LOw0VxceS8F16aFJoN4/edit MD5 considered harmful today http://www.win.tue.nl/hashclash/rogue-ca/
Views: 6798 Shane Killian
Provost Lecture - Bernhard Waldenfels: Response and Trust: Some Aspects of Responsive Ethics
A professor of philosophy at Ruhr University in Bochum, Germany, since 1976, Bernhard Waldenfels has written books about phenomenology, dialog theory, and structures of behavior. He was co-founder and vice president of the German Society for Phen omenological Research from 1970 to 1976 and president from 1994 to 1996. He also was a member of the scientific board of the College International at Paris from 1990 to 1998 and has been on the advisory board of the Institute for Genocide Studies at the University of Bochum since 1994. In this talk, response and trust will be presented as two central motives of a responsive ethics, which goes against every sort of communicative ethics orientated merely toward common aims and general norms.