BTS Meeting: Harding Lecture - A contractor view of mechanized tunnelling evolution and innovations
Speaker(s) Bruno Coombe, Bouygues.
British Tunnelling Society
Experimental Studies on a Single Microtubule (Google Workshop on Quantum Biology)
Google Workshop on Quantum Biology Experimental Studies on a Single Microtubule: Investigation of Electronic Transport Properties Presented by Anirban ...
GoogleTechTalks
ANTHONY PATCH - CERN, THE SINGULARITY AND AI
Kerry interviews Anthony Patch: TUESDAY, JAN 23, 2018 @ 7PM PT Anthony Patch Bio: anthonypatch.com email: anthonypatchauthor@gmail.com Anthony ...
Project Camelot
Dirty Business: what really happens to your recycling
Thousands of tons of plastic scrap collected for recycling from British households have been transported and dumped on sites across the world. We follow the ...
Sky News
DNS Tunneling Identification and Defense
Domain Name Service (DNS) traffic freely travels across network perimeters and internal network segments. Organizations cannot arbitrarily block this UDP port ...
Tom Olzak
A LINK TO THE PAST: CONNECTING THE BIRTH OF CYBERESPIONAGE
Cyberespionage research has come a long way. It seems like every week involves the revelation of a sophisticated, groundbreaking operation equipped with ...
Kaspersky
23C3: An Introduction to Traffic Analysis
Speaker: George Danezis Attacks, Defences and Public Policy Issues... This talk will present an overview of traffic analysis techniques, and how they can be ...
Christiaan008
Red Team Operations: Attack and Think Like a Criminal
Get $500 in ethical hacking toys: https://infosecinstitute.com/hacking-toys Are you red team, blue team — or both? Get an inside look at the offensive and ...
Infosec
Wallace Thornhill and the Electric Universe
www.thunderbolts.info.
エハン塾
ATT&CK Matrix: The Enemies Playbook
ATT&CK Matrix by MITRE is the world's most comprehensive research on malware and threats to date. Based on millions of real-world events, the Matrix ...
The CISO Perspective
Invention, Development and Commercialization of GMR Heads Oral History Panel
Interviewed by Christopher Bajorek on 2019-03-30 in Mountain View, CA X9044.2019 © Computer History Museum This oral history records the contributions of ...
Computer History Museum
Security Risks & Challenges with a Remote Workforce in a Hybrid SaaS World with SynerComm
ChannelByte's Chris Lee is joined by SynerComm's Lisa Niles, Director of Solutions Integration, and Jeff Lemmermann, Information Assurance Auditor, for this ...
ChannelBytes
Situation Awareness, Mica Endsley
Supporting Situation Awareness and Decision Making in the Health Care Setting Situation awareness (SA) is critical for effective decision making across a wide ...
CernerEng
Orange Tsai - Infiltrating Corporate Intranet Like NSA Preauth RCE - DEF CON 27 Conference
Computer security is now a public policy issue. Election security, blockchain, "going dark," the vulnerabilities equities debate, IoT safety , data privacy, ...
DEFCONConference
Metro Tunnel - Archaeology process
The state's biggest ever archaeological investigation is underway in Melbourne's CBD. Ahead of excavation works for the Metro Tunnel, archaeologists and ...
Rail Projects Victoria
Quantum Technology: Concepts and Prospects by Apoorva D. Patel
ICTS Colloquium Tittle : Quantum Technology - Concepts and Prospects Speaker : Apoorva D. Patel (Indian Institute of Science, Bangalore) DATE : Monday ...
International Centre for Theoretical Sciences
Webinar 9: Optimizing antibody-based treatments & effects from an insulin sensitizer in PD models.
In this session, Diptaman (Neil) Chatterjee presents on developing therapeutics that target intracellular proteinopathy across the brain, particularly in regions ...
The Cure Parkinson's Trust
Tunnelling Ground Risks - A Client's Perspective
Tunnelling Ground Risks - A Client's Perspective Date: 6 September 2017 Event type: Evening meeting Venue: Burlington House Speaker: Dr Chris Menkiti.
Engineering Group of the Geological Society
Network and Incident Response
Network and Incident Response: How To Leverage Tools And Patterns For Network-Based Incident Detection by Joao Collier de Mendonça at the ...
BSidesMunich
Coffee Chat with Cricket "Special Edition": BloxOne Threat Defense: Your Security Stack Unleashed
Learn How to Strengthen and Optimize Your Security Posture with BloxOne™ Threat Defense Join us for a special edition of our popular “Coffee Chat with ...
Infoblox
Light and Motion at the Nanoscale - ICTP Colloquium
By prof. Florian Marquardt Max Planck Institute for the Science of Light (MPL) in Erlangen, Germany. ABSTRACT: During the last ten years, a new research ...
Int'l Centre for Theoretical Physics
Demo Friday Cisco Umbrella First Line of Defense Against Threats
Cisco Umbrella is a cloud security platform that leverages DNS to provide the first line of defense against threats on the internet wherever users go. Because it's ...
Cisco Umbrella
Big Thinking: The Power of Nanoscience
Hear from young nano-scientists who are doing research on developing new energy sources and materials that will help answer the question -- "what will power ...
University of California Television (UCTV)
Construction Carcinogens
Ontario construction workers are regularly being exposed to dangerous substances, including diesel, asbestos, silica dust, wood dust, and the sun's UV rays.
The Agenda with Steve Paikin
Fujitsu Forum 2019 Keynote - From mathematical to industrial optimization
Quantum Computing is on the horizon, while quantum-inspired computing is already being deployed with astonishing results. But how does this new level of ...
Fujitsu
Cisco Cloud Security - Partner Webinar
Adding more boxes to your security stack won't provide the protection you need for today's decentralized networks. And it won't protect remote employees, ...
Cisco Umbrella
der.hans: SSH Tunnels
Presented to the Phoenix Linux Users Group on June 8th 2017 by der.hans Use SSH to create secure tunnels across untrusted networks and hosts.
Brian Cluff
UCA Young Members present: Engineering and Construction Considerations for the Direct Pipe® Method
Robert Hotz presents on the Direct Pipe® method for the design and construction of buried pipelines. The presentation provides an introduction to trenchless ...
WeBuildBeneath
ATC 2.1 Demo Series: Close the Gap in Your DNS Defense
Presenters: Troy Hager and Blair Rampling There's Something Missing from Your Defensive Lineup Cybersecurity is a team sport. No one player can win the ...
Infoblox
State of the Hack: Behind the ATM Heist & Other Red Team Stories
On this episode, we got right into a bunch of new in-the-wild activity! We discussed FIN6's shift to deploying enterprise ransomware, including their recent ...
FireEye, Inc.
MITRE ATT&CKcon – Day 2, 9:00 a.m. – 12:15 p.m
Explore MITRE ATT&CKcon's morning sessions with diverse insights about this critical knowledge base of adversary behavior. View full agenda: ...
mitrecorp
Hak5 - PDF Exploits
The Hack Across America series continues in week 5 with Eighty of DualCore and PDF Exploits and malware analysis. Darren and Shannon take your questions ...
Hak5
Platinum Group Metals Ltd. | Webinar Replay
Filmed by Red Cloud Financial Services Inc. on April 9th, 2020.
Red Cloud Financial Services Inc.
SWAN APAC Webinar: Pioneering Utility Smart Water Innovation is Asia-Pacific
On May 16, 2018, the SWAN Asia-Pacific Alliance held its first , free webinar featuring three, innovative utilities in the region: Unitywater, PUB, and Watercare.
SWANForum
2019 Edelman Winner Louisville MSD and Tetra Tech
Protecting Community Waterways: Applying Analytics, Optimization, and Real Time Control for the Efficient Operation of Sewer Networks With increasingly ...
INFORMS
Decision Making Under Conditions of Poverty
Sendhil Mullainathan, professor of economics at Harvard University, co-founder of Poverty Action Lab, and co-founder and co-director of ideas42, discussed his ...
Columbia Business School
The Life of Hugh Everett by Peter Byrne
The Life of Hugh Everett by Peter Byrne, King's College, at the University of California, Santa Cruz Institute for the Philosophy of Cosmology Slides available at: ...
Phil Cosmogroup
Remote Security Operations, Building Muscle Memory
Chris Calvert, Co-Founder & VP Strategy at Respond Software Inc joined the podcast for our virtual summit. Sign up for our newsletter to make sure you never ...
The CyberHub Podcast
Demystifying The Hunt How to Assess Your Threat Hunting Readiness and Prepare for the Next Step
Many organizations want to threat hunt, but dont know where to begin, how to measure success, or how to scale an effective program. The bar to successful ...
Corelight, Inc
Coal to Liquid Fuel Market 2023 Industry Trend and Demands Research Report
Coal to Liquid Fuel Market 2023 research report is useful to comprehend the worldwide and provincial market circumstances and to decide how the market will ...
Jack Septiceye
Bridging THz Gap with Quantum Cascade Lasers
While the terahertz (THz) region has many applications, such as spectroscopy, astronomy, biomedical imaging and communications, it has remained untapped ...
Waterloo Engineering
e-Security Week 1 (Introduction and Crypto Fundamentals)
https://github.com/billbuchanan/esecurity/tree/master/unit01_cipher_fundamentals.
Bill Buchanan OBE