By URL
By Username
By MRSS
Enter a URL of an MRSS feed
 
or

Medicine Social Videos by Popular

Ben Calloni, "Vulnerability Path and Assessment"

02/22/12
US Government, Department of Defense, and Enterprise computer\nsystems must be trusted to protect data with varying levels of\nsensitivity ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Buzz Out Loud 1582: The Dickensian drama of the music services world (Podcast)

02/23/12
BOL's Special Counsel Gil Cabrera joins us to break down the mobile apps privacy protections meh, the Consumer Privacy Bill of Rights and ... tags: applebacncameracellelectronicgadgetGadgets

Buzz Out Loud 1581: OS X Mountain Lion: the OS to rule the ecosystem? (Podcast)

02/16/12
Former federal CTO Aneesh Chopra joins the show today to talk wireless policy and what the heck happened with SOPA/PIPA we dish on what ... tags: applebacncameracellelectronicgadgetGadgets

Kelley Misata, "Digital Citizenship: A Target's View of Security and Life Online"

02/08/12
As technological advancements continue to expand the range of\ninformation access, issues of privacy and cyber security have risen\nto the ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Buzz Out Loud 1580: Men have little interest in Pinterest (Podcast)

02/09/12
Rafe Needleman and Donald Bell join Brian Tong on the show today to discuss all the new video-streaming options coming down the pipe. We ... tags: applebacncameracellelectronicgadgetGadgets

Stephen Elliott, ""Introduction to Biometrics""

01/11/12
A discussion about biometrics, performance and error. Learn more\nabout biometric technologies and challenges related to performance. tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Salmin Sultana, " Secure Provenance Transmission for Data Streams"

01/18/12
Many application domains, such as real-time financial analysis,\ne-healthcare systems, sensor networks, are characterized\nby continuous ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Frank Tompa, "A Flexible System for Access Control"

01/25/12
A variety of mechanisms have been used in access control systems to\nsupport enterprises' diverse security needs. For example, ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

George Vanecek, "Is it time to add Trust to the Future Internet/Web?"

02/01/12
The future web, and Internet, are undergoing a humanization of\ntheir technologies which increasingly make their services ... tags: BusinessceriaseducationEducation_Higher_EducationEducation_TrainingHigher_Educationinformation

Buzz Out Loud 1576: CES 2012 Wrap Up (Podcast)

01/13/12
It's Friday the 13th we are wrapping up CES 2012. Today on the show we discuss the Best of CES winners and losers and discuss some CES ... tags: applebacncameracellelectronicgadgetGadgets

Buzz Out Loud 1577: SOPA: it ain't over yet (Podcast)

01/19/12
The Internet flexed its power with this week's SOPA/PIPA blackouts, but make no mistake this battle isn't over yet, and will only ... tags: applebacncameracellelectronicgadgetGadgets