5:01
|
4:44
|
How computers translate human language - Ioannis Papachimonas - English
View full lesson: http://ed.ted.com/lessons/how-computers-translate-human-language-ioannis-papachimonas
Is a universal translator possible in real life? We already have many programs that claim...
View full lesson: http://ed.ted.com/lessons/how-computers-translate-human-language-ioannis-papachimonas
Is a universal translator possible in real life? We already have many programs that claim to be able to take a word, sentence, or entire book in one language and translate it into almost any other. The reality, however, is a bit more complicated. Ioannis Papachimonas shows how these machine translators work, and explains why they often get a bit mixed up.
Lesson by Ioannis Papachimonas, animation by NOWAY Video Club.
More...
Description:
View full lesson: http://ed.ted.com/lessons/how-computers-translate-human-language-ioannis-papachimonas
Is a universal translator possible in real life? We already have many programs that claim to be able to take a word, sentence, or entire book in one language and translate it into almost any other. The reality, however, is a bit more complicated. Ioannis Papachimonas shows how these machine translators work, and explains why they often get a bit mixed up.
Lesson by Ioannis Papachimonas, animation by NOWAY Video Club.
7:11
|
Explaining Web 2.0 - English
This video explains interpersonal computing, web services and software as a service (SaaS) as the the three key aspects of Web 2.0. It is produced and presented by Christopher Barnatt,...
This video explains interpersonal computing, web services and software as a service (SaaS) as the the three key aspects of Web 2.0. It is produced and presented by Christopher Barnatt, author of ExplainingComputers.com, and Associate Professor of Computing & Future Studies in Nottingham University Business School.
More...
Description:
This video explains interpersonal computing, web services and software as a service (SaaS) as the the three key aspects of Web 2.0. It is produced and presented by Christopher Barnatt, author of ExplainingComputers.com, and Associate Professor of Computing & Future Studies in Nottingham University Business School.
43:55
|
0:40
|
Recent Cyber Attacks On Irans Infrastructure - US & israel likely Suspects - 25 SEP 2010 - English
US, Israel behind cyber-attack on Iran?
Experts say a computer worm that has targeted Iran's industrial sites may be part of a cyber-attack by the US or Israel against the Islamic Republic....
US, Israel behind cyber-attack on Iran?
Experts say a computer worm that has targeted Iran's industrial sites may be part of a cyber-attack by the US or Israel against the Islamic Republic.
The Stuxnet, a computer worm that is viewed as potentially the most dangerous piece of computer malware discovered, has targeted industrial computers in Iran.
The complex worm recognizes a specific facility's control network and then destroys it.
Experts say the worm, which has a very sophisticated design, may have been created by a state-sponsored organization in the US or Israel to target specific control software being used in the Iranian industrial sector, including the Bushehr plant -- Iran's first nuclear power plant.
"All the details so far to me scream that this was created by a nation-state," Bloomberg quoted Frank Rieger, technology chief for a maker of encrypted mobile phones, as saying.
Iran's nuclear facilities may have been the targets, said both Rieger and Richard Falkenrath of the Chertoff Group, a Washington-based security advisory firm.
"It is theoretically possible that the US government did this," Falkenrath said during an interview with Bloomberg Television on Saturday. "But in my judgment, that's a very remote possibility. It's more likely that Israel did it."
Meanwhile, a top US cyber-security official claims that the US does not know who is behind the cyber-attack and is still analyzing the worm.
"We've conducted analysis on the software itself," Sean McGurk, director of the National Cybersecurity and Communications Integration Center, told reporters on Friday.
"It's very difficult to say 'This is what it was targeted to do,'" he said, adding the center was not looking for those behind the attack but it rather sought to prevent the spread.
The US and Israel accuse Iran of developing a nuclear weapons program. Iran rejects the allegation, saying its nuclear program is solely for peaceful purposes.
The International Atomic Energy Agency, in its several reports, has confirmed that it continues to verify the country's non-diversion from its peaceful path.
Article Source: http://www.presstv.ir/detail/143868.html
More...
Description:
US, Israel behind cyber-attack on Iran?
Experts say a computer worm that has targeted Iran's industrial sites may be part of a cyber-attack by the US or Israel against the Islamic Republic.
The Stuxnet, a computer worm that is viewed as potentially the most dangerous piece of computer malware discovered, has targeted industrial computers in Iran.
The complex worm recognizes a specific facility's control network and then destroys it.
Experts say the worm, which has a very sophisticated design, may have been created by a state-sponsored organization in the US or Israel to target specific control software being used in the Iranian industrial sector, including the Bushehr plant -- Iran's first nuclear power plant.
"All the details so far to me scream that this was created by a nation-state," Bloomberg quoted Frank Rieger, technology chief for a maker of encrypted mobile phones, as saying.
Iran's nuclear facilities may have been the targets, said both Rieger and Richard Falkenrath of the Chertoff Group, a Washington-based security advisory firm.
"It is theoretically possible that the US government did this," Falkenrath said during an interview with Bloomberg Television on Saturday. "But in my judgment, that's a very remote possibility. It's more likely that Israel did it."
Meanwhile, a top US cyber-security official claims that the US does not know who is behind the cyber-attack and is still analyzing the worm.
"We've conducted analysis on the software itself," Sean McGurk, director of the National Cybersecurity and Communications Integration Center, told reporters on Friday.
"It's very difficult to say 'This is what it was targeted to do,'" he said, adding the center was not looking for those behind the attack but it rather sought to prevent the spread.
The US and Israel accuse Iran of developing a nuclear weapons program. Iran rejects the allegation, saying its nuclear program is solely for peaceful purposes.
The International Atomic Energy Agency, in its several reports, has confirmed that it continues to verify the country's non-diversion from its peaceful path.
Article Source: http://www.presstv.ir/detail/143868.html
41:04
|
Security Education using Virtualization and Remote Labs - English
Erich Spengler and John Sands, from Moraine Valley Community College and CSSIA, give a presentation on Security Education using Virtualization and Remote Labs at the 2011 National and Mid-Pacific...
Erich Spengler and John Sands, from Moraine Valley Community College and CSSIA, give a presentation on Security Education using Virtualization and Remote Labs at the 2011 National and Mid-Pacific ICT Center Winter Educator Conference at City College of San Francisco.
More...
Description:
Erich Spengler and John Sands, from Moraine Valley Community College and CSSIA, give a presentation on Security Education using Virtualization and Remote Labs at the 2011 National and Mid-Pacific ICT Center Winter Educator Conference at City College of San Francisco.
23:06
|
Flash Military Radar Screen Animation Actionscript 3.0 Tutorial CS3 CS4 CS5 - English
Source Code: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1132
Adam Khoury shows Flashers how to construct their own military radar screen animations from scratch. Complete...
Source Code: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1132
Adam Khoury shows Flashers how to construct their own military radar screen animations from scratch. Complete with moving enemies and sound.
Lesson @ http:www.developphp.com ... where tons more tutorials reside.
More...
Description:
Source Code: http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=1132
Adam Khoury shows Flashers how to construct their own military radar screen animations from scratch. Complete with moving enemies and sound.
Lesson @ http:www.developphp.com ... where tons more tutorials reside.
How to Download & Install Adobe Flash Player - English
To download and install Adobe Flash Player, visit adobe.com, select the "Downloads" section, find the Flash Player, and follow the instructions for downloading it to the computer. Wash...
To download and install Adobe Flash Player, visit adobe.com, select the "Downloads" section, find the Flash Player, and follow the instructions for downloading it to the computer. Wash flash videos using the Adobe Flash Player with helpful tips from a software developer in this free video on computers.
More...
Description:
To download and install Adobe Flash Player, visit adobe.com, select the "Downloads" section, find the Flash Player, and follow the instructions for downloading it to the computer. Wash flash videos using the Adobe Flash Player with helpful tips from a software developer in this free video on computers.
8:03
|
2:07
|
[26 Dec 2013] Iran charity organization provides support to Somali women - English
After months-long training, Iran\\\'s Imam Khomeini Relief Foundation and the Iranian embassy in Somalia held the graduation ceremony of more than fifty women and girls in Mogadishu on Wednesday....
After months-long training, Iran\\\'s Imam Khomeini Relief Foundation and the Iranian embassy in Somalia held the graduation ceremony of more than fifty women and girls in Mogadishu on Wednesday. Through its training centers in Mogadishu, Iran has assisted Somali women by offering them training in the fields of tailoring and use of computers. The women and girls were issued with sewing machines and certificates upon completion of their respective courses in a colorful event that was held in capital city\\\'s Hamar Weyne district.
More...
Description:
After months-long training, Iran\\\'s Imam Khomeini Relief Foundation and the Iranian embassy in Somalia held the graduation ceremony of more than fifty women and girls in Mogadishu on Wednesday. Through its training centers in Mogadishu, Iran has assisted Somali women by offering them training in the fields of tailoring and use of computers. The women and girls were issued with sewing machines and certificates upon completion of their respective courses in a colorful event that was held in capital city\\\'s Hamar Weyne district.
25:13
|
[16 Jan 2014] The Debate - Privacy Piracy - English
Imagine if you\\\'re not connected to the internet, yet your computer is still vulnerable in being spied on: That is the latest leak by former NSA contractor Edward Snowden: that the US National...
Imagine if you\\\'re not connected to the internet, yet your computer is still vulnerable in being spied on: That is the latest leak by former NSA contractor Edward Snowden: that the US National Security Agency (NSA) used secret technology to spy on computers that were not even connected to the internet. In this edition of the debate, we\\\'ll discuss how this takes spying on ordinary citizens to a whole new level, even though NSA claims targets included the Chinese and Russian military as well as drug cartels. We\\\'ll also further disclose how this violates privacy laws, not to mention the US constitution.
More...
Description:
Imagine if you\\\'re not connected to the internet, yet your computer is still vulnerable in being spied on: That is the latest leak by former NSA contractor Edward Snowden: that the US National Security Agency (NSA) used secret technology to spy on computers that were not even connected to the internet. In this edition of the debate, we\\\'ll discuss how this takes spying on ordinary citizens to a whole new level, even though NSA claims targets included the Chinese and Russian military as well as drug cartels. We\\\'ll also further disclose how this violates privacy laws, not to mention the US constitution.
14:54
|
10:47
|
Dhul Qarnayn : The Ultimate Journey - Part 4 I French sub English
So, my brothers and sisters, we can hear like you and me, we have heard it before, that it is the little voice of Iblis that whispers in our ears and that\'s right, that\'s the voice of the devil....
So, my brothers and sisters, we can hear like you and me, we have heard it before, that it is the little voice of Iblis that whispers in our ears and that\'s right, that\'s the voice of the devil. But today, how this verse makes sense, as it has never made so much sense, because that voice of Iblis, it is evident all over the world. Through what intermediary? Well, through communication tools: Television, information that is broadcast on television, telephones, computers, etc... All means of communication that allow to the machine, to Iblis, through the machine of artificial intelligence. And that he works hard, as we say, so that this voice is permanently broadcasted, by radio waves, by satellites, etc... And that voice is always there.
And incite with your voice those among them that you can, he says those you can, because you know that in the rest of the verse, there\'s one part (among people) he can\'t have. And gather against them your cavalry and your infantry, and how can you gather your cavalry and infantry? By sharing with them, how? Through wealth, it means, through money. And through what? Through the children.
https://www.timetowitness.com/dhul-qarnayn-the-ultimate-journey-part-4/
📺 Check out our Playlists
Science & Technology : https://link.timetowitness.com/play/science
Eschatology : https://link.timetowitness.com/play/eschatology
Spirituality: https://link.timetowitness.com/play/spirituality
Neom Project: https://link.timetowitness.com/play/neom
🔴 Don\'t forget to 🔴
🔵 Join our Telegram channel : https://link.timetowitness.com/telegram
✅ Subscribe to our channel : https://link.timetowitness.com/youtube/subscribe
📩 Subscribe to our newsletter : https://link.timetowitness.com/email/subscribe
🔴 Follow us on 🔴
🌐 Our Blog : https://www.timetowitness.com/
📢 Facebook : https://link.timetowitness.com/facebook
📢 Twitter : https://link.timetowitness.com/twitter
📢 Pinterest : https://link.timetowitness.com/pinterest
📢 Reddit : https://link.timetowitness.com/reddit
📢 Instagram : https://link.timetowitness.com/instagram
PLEASE NOTE:
Any of the views expressed by the speakers do not necessarily represent the views of Time2Witness or any other projects it may have or intend to do. Time2Witness and it\'s affiliates do not advocate nor condone any unlawful activity towards any individual or community.
More...
Description:
So, my brothers and sisters, we can hear like you and me, we have heard it before, that it is the little voice of Iblis that whispers in our ears and that\'s right, that\'s the voice of the devil. But today, how this verse makes sense, as it has never made so much sense, because that voice of Iblis, it is evident all over the world. Through what intermediary? Well, through communication tools: Television, information that is broadcast on television, telephones, computers, etc... All means of communication that allow to the machine, to Iblis, through the machine of artificial intelligence. And that he works hard, as we say, so that this voice is permanently broadcasted, by radio waves, by satellites, etc... And that voice is always there.
And incite with your voice those among them that you can, he says those you can, because you know that in the rest of the verse, there\'s one part (among people) he can\'t have. And gather against them your cavalry and your infantry, and how can you gather your cavalry and infantry? By sharing with them, how? Through wealth, it means, through money. And through what? Through the children.
https://www.timetowitness.com/dhul-qarnayn-the-ultimate-journey-part-4/
📺 Check out our Playlists
Science & Technology : https://link.timetowitness.com/play/science
Eschatology : https://link.timetowitness.com/play/eschatology
Spirituality: https://link.timetowitness.com/play/spirituality
Neom Project: https://link.timetowitness.com/play/neom
🔴 Don\'t forget to 🔴
🔵 Join our Telegram channel : https://link.timetowitness.com/telegram
✅ Subscribe to our channel : https://link.timetowitness.com/youtube/subscribe
📩 Subscribe to our newsletter : https://link.timetowitness.com/email/subscribe
🔴 Follow us on 🔴
🌐 Our Blog : https://www.timetowitness.com/
📢 Facebook : https://link.timetowitness.com/facebook
📢 Twitter : https://link.timetowitness.com/twitter
📢 Pinterest : https://link.timetowitness.com/pinterest
📢 Reddit : https://link.timetowitness.com/reddit
📢 Instagram : https://link.timetowitness.com/instagram
PLEASE NOTE:
Any of the views expressed by the speakers do not necessarily represent the views of Time2Witness or any other projects it may have or intend to do. Time2Witness and it\'s affiliates do not advocate nor condone any unlawful activity towards any individual or community.