Policy Dept - What is it, what are we trying to do for hackers in PolicyWorld?
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 85 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/62199 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
BitClosed setMathematicsPower (physics)SpacetimeHacker (term)Information securityMereologyLevel (video gaming)Self-organizationPerspective (visual)Context awarenessRight angleScaling (geometry)Machine visionFormal languageOrder (biology)Process (computing)Game controllerData conversionInformationOnline helpInformation privacyTangentFamilyInteractive televisionRange (statistics)Software bugInstance (computer science)Vulnerability (computing)Computer programmingPentagonVector potentialGoodness of fitPhysical systemBranch (computer science)Connected spaceThermal expansionShape (magazine)Form (programming)State of matterLocal ringMoment (mathematics)
09:58
Raw image formatMultiplication signDifferent (Kate Ryan album)Virtual machineFeedbackInteractive televisionGroup actionLevel (video gaming)ExistenceVotingHacker (term)Point (geometry)Power (physics)Multitier architectureTrailContext awarenessSelf-organizationSheaf (mathematics)QuicksortExpert systemTraffic reportingCountingProcess (computing)BitRule of inferenceComputer programmingIntegrated development environmentInformationComputer hardwareCivil engineeringGoodness of fitDirection (geometry)Position operatorDesign by contractMathematicsPerspective (visual)Information securityFreewareReliefAnnihilator (ring theory)CausalityTable (information)Forcing (mathematics)Right angleCybersexSpacetimeRow (database)Strategy gameGodBridging (networking)Information privacyVulnerability (computing)NeuroinformatikDependent and independent variablesMeasurementShift operatorAreaData conversionVacuumPhysical lawCrash (computing)Capability Maturity ModelCryptographyInternetworkingHookingRegulator geneMachine visionInterface (computing)Representation (politics)Staff (military)Branch (computer science)Auditory maskingOffice suiteFocus (optics)Proxy serverCASE <Informatik>Email
19:55
Point (geometry)BitDependent and independent variablesVotingData recoveryData conversionHacker (term)CybersexPosition operatorProcess (computing)Self-organizationQuicksortMeasurementLevel (video gaming)Computer hardwareInterface (computing)Branch (computer science)Information securityPhysical lawVulnerability (computing)SpacetimeInformation privacyNeuroinformatikAuditory maskingGoodness of fitCapability Maturity ModelMachine visionVacuumInternetworkingMultiplication signEmailDifferent (Kate Ryan album)Office suiteFocus (optics)CASE <Informatik>Group actionRight angleSinc functionRepresentation (politics)Crash (computing)AreaProxy serverRegulator geneStaff (military)Shift operatorSheaf (mathematics)Traffic reporting
29:53
CybersexInformation securityRight anglePhysical lawFlow separationIntegrated development environmentVulnerability (computing)Perspective (visual)Hacker (term)Multiplication signVector potentialPoint (geometry)View (database)outputQuicksortFrustrationFigurate numberSpacetimeMathematicsFile formatMereologyProcess (computing)CollaborationismContent (media)Open sourceLatent heatSoftwareGoodness of fitData conversionLattice (order)ChainBuildingMomentumProfil (magazine)Computer programmingIncidence algebraLoginGroup actionVapor barrierBitTable (information)TrailEnterprise architectureType theoryFamilyDifferent (Kate Ryan album)System callConnected space2 (number)Physical systemDivisorAssociative propertyLecture/Conference
39:50
CybersexInformation securityMultiplication signCuboidSimilarity (geometry)Endliche ModelltheorieInstance (computer science)Mathematical optimizationAuthenticationState of matterRegulator geneChannel capacityBitProcess (computing)Maxima and minimaSpeech synthesisPerspective (visual)outputPoint (geometry)Enterprise architectureGroup actionDrag (physics)CASE <Informatik>Level (video gaming)CausalityField (computer science)NumberSpacetimeOffice suiteCivil engineeringMessage passingHacker (term)Representation (politics)Online helpPower (physics)Position operatorFrustrationType theoryHydraulic jumpImage resolutionGoodness of fitGame controllerTerm (mathematics)PasswordQuicksortData conversionWhiteboard
49:48
Process (computing)Hacker (term)Data miningMultiplication signTerm (mathematics)Equivalence relationState of matterBitVideo gamePasswordTraffic reportingPoint (geometry)Moment (mathematics)Goodness of fitContent (media)Computer programmingData conversionType theoryDigitizingRegulator geneIncidence algebraComputer clusterHybrid computerRight angleDifferent (Kate Ryan album)Food energyAreaTwitterNational Institute of Standards and TechnologyNichtlineares GleichungssystemSystem administratorExpert systemForcing (mathematics)Sign (mathematics)Software frameworkBookmark (World Wide Web)WindowCausalityMeasurementInformation privacyCryptographyMathematicsSound effectDirectory servicePosition operator
Transcript: English(auto-generated)