|
|
![](/img/b.png) | | time | views | |
![](https://i.ytimg.com/vi/d9LjcuZTzz0/default.jpg) | Video 2: Placing Objects on the Scanner | 6:70 | 401 | |
![](https://i.ytimg.com/vi/gZ9DWdzGNqQ/default.jpg) | Video 23: Liquid Battery Case Study | 7:53 | 115 | |
![](https://i.ytimg.com/vi/h1GtR8xJraw/default.jpg) | Video 14: Using a Smartphone | 4:52 | 237 | |
![](https://i.ytimg.com/vi/37CbZdeh_lU/default.jpg) | How-To-Do-It: Convert an Image from Horizontal to Vertical | 1:40 | 107 | |
![](https://i.ytimg.com/vi/7wOsPc0XtpY/default.jpg) | Video 6: Setting the Exposure | 3:55 | 148 | |
![](https://i.ytimg.com/vi/C1lhuz6pZC0/default.jpg) | 1. Introduction and Optimization Problems | 40:57 | 19,231 | |
![](https://i.ytimg.com/vi/esmzYhuFnds/default.jpg) | 12. Clustering | 50:40 | 2,679 | |
![](https://i.ytimg.com/vi/6wUD_gp5WeE/default.jpg) | 5. Random Walks | 49:21 | 2,103 | |
![](https://i.ytimg.com/vi/fQvg-hh9dUw/default.jpg) | 10. Understanding Experimental Data (cont.) | 50:33 | 901 | |
![](https://i.ytimg.com/vi/V_TulH374hw/default.jpg) | 3. Graph-theoretic Models | 50:11 | 2,206 | |
![](https://i.ytimg.com/vi/rUxP7TM8-wo/default.jpg) | 7. Confidence Intervals | 50:29 | 1,135 | |
![](https://i.ytimg.com/vi/eg8DJYwdMyg/default.jpg) | 13. Classification | 49:54 | 914 | |
![](https://i.ytimg.com/vi/h0e2HAPTGF4/default.jpg) | 11. Introduction to Machine Learning | 51:31 | 8,306 | |
![](https://i.ytimg.com/vi/-1BnXEwHUok/default.jpg) | 4. Stochastic Thinking | 49:50 | 1,994 | |
![](https://i.ytimg.com/vi/OgO1gpXSUzU/default.jpg) | 6. Monte Carlo Simulation | 50:50 | 6,059 | |
![](https://i.ytimg.com/vi/K2SC-WPdT6k/default.jpg) | 14. Classification and Statistical Sins | 49:25 | 565 | |
![](https://i.ytimg.com/vi/uK5yvoXnkSk/default.jpg) | 2. Optimization Problems | 48:40 | 3,579 | |
![](https://i.ytimg.com/vi/vIFKGFl1Cn8/default.jpg) | 9. Understanding Experimental Data | 47:60 | 1,019 | |
![](https://i.ytimg.com/vi/soZv_KKax3E/default.jpg) | 8. Sampling and Standard Error | 46:45 | 653 | |
![](https://i.ytimg.com/vi/iOZVbILaIZc/default.jpg) | 15. Statistical Sins and Wrap Up | 44:43 | 512 | |
![](https://i.ytimg.com/vi/5EodYYcTgaE/default.jpg) | Please support OPEN through MIT OpenCourseWare | 0:37 | 5,274 | |
![](https://i.ytimg.com/vi/MsIvs_6vC38/default.jpg) | Lec 4 Factorization into A = LU | 48:50 | 8,830 | |
![](https://i.ytimg.com/vi/8PdnOZI7H5E/default.jpg) | 23. Security Economics | 1:17:25 | 3,224 | |
![](https://i.ytimg.com/vi/OgGTJIgNewE/default.jpg) | 19. Anonymous Communication | 1:20:13 | 2,294 | |
![](https://i.ytimg.com/vi/2PO8h1pVW50/default.jpg) | 22. Guest Lecture by MIT IS&T | 1:26:51 | 700 | |
![](https://i.ytimg.com/vi/I0Psvvky-44/default.jpg) | 7. Sandboxing Native Code | 1:23:21 | 1,671 | |
![](https://i.ytimg.com/vi/dNl22h1kW1k/default.jpg) | 4. Privilege Separation | 1:23:29 | 1,754 | |
![](https://i.ytimg.com/vi/uT7BXusDgDM/default.jpg) | 20. Mobile Phone Security | 1:22:00 | 1,677 | |
![](https://i.ytimg.com/vi/TQhmua7Z2cY/default.jpg) | 6. Capabilities | 1:21:57 | 1,285 | |
![](https://i.ytimg.com/vi/r4KjHEgg9Wg/default.jpg) | 2. Control Hijacking Attacks | 1:27:39 | 5,115 | |
![](https://i.ytimg.com/vi/3v5Von-oNUg/default.jpg) | 16. Side-Channel Attacks | 1:22:16 | 710 | |
![](https://i.ytimg.com/vi/xSQxaie_h1o/default.jpg) | 3. Buffer Overflow Exploits and Defenses | 1:21:38 | 2,565 | |
![](https://i.ytimg.com/vi/WlmKwIe9z1Q/default.jpg) | 9. Securing Web Applications | 1:22:80 | 1,624 | |
![](https://i.ytimg.com/vi/eRJ_r8WF1Y0/default.jpg) | 8. Web Security Model | 1:22:49 | 1,797 | |
![](https://i.ytimg.com/vi/MT7X17ZRo1U/default.jpg) | 17. User Authentication | 1:19:48 | 869 | |
![](https://i.ytimg.com/vi/bA3xCpYLA34/default.jpg) | 15. Medical Software | 1:15:31 | 343 | |
![](https://i.ytimg.com/vi/BZTWXl9QNK8/default.jpg) | 12. Network Security | 1:18:26 | 808 | |
![](https://i.ytimg.com/vi/q1OF_0ICt9A/default.jpg) | 14. SSL and HTTPS | 1:18:18 | 856 | |
![](https://i.ytimg.com/vi/XMEFdofERLI/default.jpg) | 11. Ur/Web | 1:20:40 | 229 | |
![](https://i.ytimg.com/vi/WG5UbMrUiLU/default.jpg) | 21. Data Tracking | 1:19:38 | 309 | |
![](https://i.ytimg.com/vi/YTWXAFJf8bw/default.jpg) | 18. Private Browsing | 1:20:13 | 520 | |
![](https://i.ytimg.com/vi/vuS8mlpRn_0/default.jpg) | 17. Series Expansions Part 3 | 1:19:57 | 1,360 | |
![](https://i.ytimg.com/vi/cLfyjIlu9Uw/default.jpg) | Introduction to the Course | 3:54 | 8,554 | |
![](https://i.ytimg.com/vi/ADWGuj3nDQo/default.jpg) | The Changing Role of the Corporation: Interview with John Reed | 7:23 | 321 | |
![](https://i.ytimg.com/vi/6gffCYK1_nk/default.jpg) | Interview with Jianming Zhou and Ryder Pearce | 19:54 | 292 | |
![](https://i.ytimg.com/vi/8MLEYc3PLUc/default.jpg) | What Occupations are Growing? | 5:18 | 1,489 | |
![](https://i.ytimg.com/vi/lbqlj1g8gu0/default.jpg) | Discussion of Student Reports on Their Plans for Action | 1:31:29 | 462 | |
![](https://i.ytimg.com/vi/CBToKajn2u4/default.jpg) | Introduction to Week 3 | 6:19 | 110 | |
![](https://i.ytimg.com/vi/DE9TnscEmtw/default.jpg) | Around the World: Role of the Corporation in Different Societies | 6:34 | 130 | |
![](https://i.ytimg.com/vi/C-n3hyz-sSY/default.jpg) | High Performance Work Systems | 7:51 | 494 | |
![](https://i.ytimg.com/vi/C_akTI3vnHQ/default.jpg) | The Post-War Social Contract | 6:28 | 273 | |
![](https://i.ytimg.com/vi/DidA5vk0h_U/default.jpg) | High School and College: Necessary but Not Sufficient | 3:11 | 638 | |
![](https://i.ytimg.com/vi/ICBy0tTtgR4/default.jpg) | What Changed in the 1980s and Why Should We Care? | 4:56 | 132 | |
![](https://i.ytimg.com/vi/Hu-ZLesnxfc/default.jpg) | Introduction to Week 4 | 9:10 | 40 | |
![](https://i.ytimg.com/vi/Gr_MZYzAWGI/default.jpg) | Life Long Learning: Moving from Rhetoric to Reality | 7:10 | 86 | |
![](https://i.ytimg.com/vi/MrQwihmwKoc/default.jpg) | Early Childhood Education for All | 4:15 | 92 | |
![](https://i.ytimg.com/vi/LxDmWdOwIA8/default.jpg) | A Guide to the Negotiations Exercise | 10:70 | 99 | |
![](https://i.ytimg.com/vi/M4dl1quiPPY/default.jpg) | Around the World: Interview with Ms. Nazma Akter | 10:52 | 48 | |
![](https://i.ytimg.com/vi/d5chZ4A54DI/default.jpg) | Alternatives to the Traditional Corporation | 6:24 | 52 | |
![](https://i.ytimg.com/vi/fbE9xXfb0PA/default.jpg) | Interview with Erik Brynjolfsson | 12:41 | 65 | |
![](https://i.ytimg.com/vi/_CUXbDB0bUU/default.jpg) | The Purpose of the American Corporation | 9:35 | 61 | |
![](https://i.ytimg.com/vi/VieMadwoNNs/default.jpg) | Careers and Competencies with Professor Lee Dyer | 8:25 | 82 | |
![](https://i.ytimg.com/vi/XWFocLnBdhM/default.jpg) | The Decline of Unions in the United States | 4:37 | 52 | |
![](https://i.ytimg.com/vi/UmLCGjbeeJ8/default.jpg) | MIT Technology Conference with Meryam Bukhari | 11:16 | 41 | |
![](https://i.ytimg.com/vi/RKjvoLeojfk/default.jpg) | Social Contracts, Past and Present | 11:25 | 52 | |
![](https://i.ytimg.com/vi/UybHQEFy56c/default.jpg) | The Market Basket Case | 6:44 | 68 | |
![](https://i.ytimg.com/vi/Q69ILtZSteE/default.jpg) | Introduction to Week 5 | 6:39 | 71 | |
![](https://i.ytimg.com/vi/Q67wzxKElp8/default.jpg) | The Rise and Fall of Saturn | 6:40 | 79 | |
![](https://i.ytimg.com/vi/juxuwNK3G-c/default.jpg) | A Message from U.S. Secretary of Labor Thomas Perez to the Next Generation Workforce | 9:21 | 230 | |
![](https://i.ytimg.com/vi/l-bSkqJ6ytE/default.jpg) | Current Challenges and Opportunities: Today's Labor Market in Perspective | 5:34 | 101 | |
![](https://i.ytimg.com/vi/sDnM5fTqXv4/default.jpg) | Worker Advocacy and Technology | 6:41 | 63 | |
![](https://i.ytimg.com/vi/q2mz6LZVnT8/default.jpg) | Interviews with Barbara Dyer and Scott Stern | 9:10 | 34 | |
![](https://i.ytimg.com/vi/OmiGPen5vSo/default.jpg) | The New Deal at Work | 7:42 | 49 | |
![](https://i.ytimg.com/vi/PZQgldCzIjs/default.jpg) | Meet Professor Kochan and the 15.662x Team | 5:18 | 339 | |
![](https://i.ytimg.com/vi/yGvxqV-qpQ8/default.jpg) | Introduction to Week 2 | 6:49 | 79 | |
![](https://i.ytimg.com/vi/yBvKhgnYLM4/default.jpg) | All Innovations Are Local | 6:33 | 130 | |
![](https://i.ytimg.com/vi/r1yb4-JvZhU/default.jpg) | A Message from AFL-CIO Secretary Treasurer Liz Shuler | 8:27 | 143 | |
![](https://i.ytimg.com/vi/xApFTcsFPcQ/default.jpg) | Uber Case Study | 5:20 | 168 | |
![](https://i.ytimg.com/vi/uc8kW2iDA3A/default.jpg) | The Millennial Generation's Views on their World of Work | 4:44 | 183 | |
![](https://i.ytimg.com/vi/Wi4W4PTzdhI/default.jpg) | Introduction to Week 1 | 4:31 | 252 | |
![](https://i.ytimg.com/vi/yBgKkYcoPgM/default.jpg) | Animated History of Work | 3:13 | 213 | |
![](https://i.ytimg.com/vi/mslvJdTQhHc/default.jpg) | Managing Societal and Workplace Conflicts: Interview with Mary Rowe | 21:70 | 79 | |
![](https://i.ytimg.com/vi/WJUHzSQPRVM/default.jpg) | Holding Global Corporations Accountable | 8:57 | 150 | |
![](https://i.ytimg.com/vi/xDoe1HvHfbM/default.jpg) | Emerging Forms of Work | 5:90 | 427 | |
![](https://i.ytimg.com/vi/Tpaw_dE9LyY/default.jpg) | A Message from Guy Ryder, ILO Director-General | 3:37 | 69 | |
![](https://i.ytimg.com/vi/jfhdvFAplpU/default.jpg) | A Message to HR Professionals from Professor Lee Dyer | 3:20 | 80 | |
![](https://i.ytimg.com/vi/5eKqzY-dyxQ/default.jpg) | Introduction to Week 6 | 7:43 | 20 | |
![](https://i.ytimg.com/vi/zoa2pKYp_fk/default.jpg) | Active Learning Overview | 5:00 | 1,343 | |
![](https://i.ytimg.com/vi/hpM-siY2Bl0/default.jpg) | Active Learning Strategy: Personal Response Systems | 9:27 | 373 | |
![](https://i.ytimg.com/vi/fqrOxeL-fwk/default.jpg) | Active Learning Strategy: Think-Pair-Share | 3:10 | 416 | |
![](https://i.ytimg.com/vi/I1IeF7D7kkY/default.jpg) | Active Learning Strategy: Debates | 2:16 | 469 | |
![](https://i.ytimg.com/vi/I7_PfCBBcFI/default.jpg) | Active Learning Strategy: Lightning Round | 4:37 | 211 | |
![](https://i.ytimg.com/vi/n9uDbwgnSp0/default.jpg) | Active Learning Strategy: Mud Cards | 3:29 | 203 | |
![](https://i.ytimg.com/vi/hGBNi4P9OfA/default.jpg) | 5. Teaching Methodologies, Part II: Active Learning: Why and How | 1:27:36 | 402 | |
![](https://i.ytimg.com/vi/Zm8uMV5aMdw/default.jpg) | Meet the Educator | 1:70 | 732 | |
![](https://i.ytimg.com/vi/Nrylh_-40ng/default.jpg) | Active Learning Strategy: Jigsaw | 5:18 | 292 | |
![](https://i.ytimg.com/vi/L-Sv1oL43ew/default.jpg) | Active Learning Strategy: Beach Ball | 3:70 | 378 | |
![](https://i.ytimg.com/vi/rqI_0FNAeS0/default.jpg) | 8. Teaching with Educational Technology | 1:07:11 | 209 | |
![](https://i.ytimg.com/vi/aGuZTE8-lOQ/default.jpg) | 3. Designing a Course: Developing Learning Outcomes | 1:16:45 | 500 | |
![](https://i.ytimg.com/vi/ytpJdnlu9ug/default.jpg) | 1. What is Computation? | 43:60 | 42,495 | |
|
|