|
|
| | time | views | |
| Video 2: Placing Objects on the Scanner | 6:70 | 401 | |
| Video 23: Liquid Battery Case Study | 7:53 | 115 | |
| Video 14: Using a Smartphone | 4:52 | 237 | |
| How-To-Do-It: Convert an Image from Horizontal to Vertical | 1:40 | 107 | |
| Video 6: Setting the Exposure | 3:55 | 148 | |
| 1. Introduction and Optimization Problems | 40:57 | 19,231 | |
| 12. Clustering | 50:40 | 2,679 | |
| 5. Random Walks | 49:21 | 2,103 | |
| 10. Understanding Experimental Data (cont.) | 50:33 | 901 | |
| 3. Graph-theoretic Models | 50:11 | 2,206 | |
| 7. Confidence Intervals | 50:29 | 1,135 | |
| 13. Classification | 49:54 | 914 | |
| 11. Introduction to Machine Learning | 51:31 | 8,306 | |
| 4. Stochastic Thinking | 49:50 | 1,994 | |
| 6. Monte Carlo Simulation | 50:50 | 6,059 | |
| 14. Classification and Statistical Sins | 49:25 | 565 | |
| 2. Optimization Problems | 48:40 | 3,579 | |
| 9. Understanding Experimental Data | 47:60 | 1,019 | |
| 8. Sampling and Standard Error | 46:45 | 653 | |
| 15. Statistical Sins and Wrap Up | 44:43 | 512 | |
| Please support OPEN through MIT OpenCourseWare | 0:37 | 5,274 | |
| Lec 4 Factorization into A = LU | 48:50 | 8,830 | |
| 23. Security Economics | 1:17:25 | 3,224 | |
| 19. Anonymous Communication | 1:20:13 | 2,294 | |
| 22. Guest Lecture by MIT IS&T | 1:26:51 | 700 | |
| 7. Sandboxing Native Code | 1:23:21 | 1,671 | |
| 4. Privilege Separation | 1:23:29 | 1,754 | |
| 20. Mobile Phone Security | 1:22:00 | 1,677 | |
| 6. Capabilities | 1:21:57 | 1,285 | |
| 2. Control Hijacking Attacks | 1:27:39 | 5,115 | |
| 16. Side-Channel Attacks | 1:22:16 | 710 | |
| 3. Buffer Overflow Exploits and Defenses | 1:21:38 | 2,565 | |
| 9. Securing Web Applications | 1:22:80 | 1,624 | |
| 8. Web Security Model | 1:22:49 | 1,797 | |
| 17. User Authentication | 1:19:48 | 869 | |
| 15. Medical Software | 1:15:31 | 343 | |
| 12. Network Security | 1:18:26 | 808 | |
| 14. SSL and HTTPS | 1:18:18 | 856 | |
| 11. Ur/Web | 1:20:40 | 229 | |
| 21. Data Tracking | 1:19:38 | 309 | |
| 18. Private Browsing | 1:20:13 | 520 | |
| 17. Series Expansions Part 3 | 1:19:57 | 1,360 | |
| Introduction to the Course | 3:54 | 8,554 | |
| The Changing Role of the Corporation: Interview with John Reed | 7:23 | 321 | |
| Interview with Jianming Zhou and Ryder Pearce | 19:54 | 292 | |
| What Occupations are Growing? | 5:18 | 1,489 | |
| Discussion of Student Reports on Their Plans for Action | 1:31:29 | 462 | |
| Introduction to Week 3 | 6:19 | 110 | |
| Around the World: Role of the Corporation in Different Societies | 6:34 | 130 | |
| High Performance Work Systems | 7:51 | 494 | |
| The Post-War Social Contract | 6:28 | 273 | |
| High School and College: Necessary but Not Sufficient | 3:11 | 638 | |
| What Changed in the 1980s and Why Should We Care? | 4:56 | 132 | |
| Introduction to Week 4 | 9:10 | 40 | |
| Life Long Learning: Moving from Rhetoric to Reality | 7:10 | 86 | |
| Early Childhood Education for All | 4:15 | 92 | |
| A Guide to the Negotiations Exercise | 10:70 | 99 | |
| Around the World: Interview with Ms. Nazma Akter | 10:52 | 48 | |
| Alternatives to the Traditional Corporation | 6:24 | 52 | |
| Interview with Erik Brynjolfsson | 12:41 | 65 | |
| The Purpose of the American Corporation | 9:35 | 61 | |
| Careers and Competencies with Professor Lee Dyer | 8:25 | 82 | |
| The Decline of Unions in the United States | 4:37 | 52 | |
| MIT Technology Conference with Meryam Bukhari | 11:16 | 41 | |
| Social Contracts, Past and Present | 11:25 | 52 | |
| The Market Basket Case | 6:44 | 68 | |
| Introduction to Week 5 | 6:39 | 71 | |
| The Rise and Fall of Saturn | 6:40 | 79 | |
| A Message from U.S. Secretary of Labor Thomas Perez to the Next Generation Workforce | 9:21 | 230 | |
| Current Challenges and Opportunities: Today's Labor Market in Perspective | 5:34 | 101 | |
| Worker Advocacy and Technology | 6:41 | 63 | |
| Interviews with Barbara Dyer and Scott Stern | 9:10 | 34 | |
| The New Deal at Work | 7:42 | 49 | |
| Meet Professor Kochan and the 15.662x Team | 5:18 | 339 | |
| Introduction to Week 2 | 6:49 | 79 | |
| All Innovations Are Local | 6:33 | 130 | |
| A Message from AFL-CIO Secretary Treasurer Liz Shuler | 8:27 | 143 | |
| Uber Case Study | 5:20 | 168 | |
| The Millennial Generation's Views on their World of Work | 4:44 | 183 | |
| Introduction to Week 1 | 4:31 | 252 | |
| Animated History of Work | 3:13 | 213 | |
| Managing Societal and Workplace Conflicts: Interview with Mary Rowe | 21:70 | 79 | |
| Holding Global Corporations Accountable | 8:57 | 150 | |
| Emerging Forms of Work | 5:90 | 427 | |
| A Message from Guy Ryder, ILO Director-General | 3:37 | 69 | |
| A Message to HR Professionals from Professor Lee Dyer | 3:20 | 80 | |
| Introduction to Week 6 | 7:43 | 20 | |
| Active Learning Overview | 5:00 | 1,343 | |
| Active Learning Strategy: Personal Response Systems | 9:27 | 373 | |
| Active Learning Strategy: Think-Pair-Share | 3:10 | 416 | |
| Active Learning Strategy: Debates | 2:16 | 469 | |
| Active Learning Strategy: Lightning Round | 4:37 | 211 | |
| Active Learning Strategy: Mud Cards | 3:29 | 203 | |
| 5. Teaching Methodologies, Part II: Active Learning: Why and How | 1:27:36 | 402 | |
| Meet the Educator | 1:70 | 732 | |
| Active Learning Strategy: Jigsaw | 5:18 | 292 | |
| Active Learning Strategy: Beach Ball | 3:70 | 378 | |
| 8. Teaching with Educational Technology | 1:07:11 | 209 | |
| 3. Designing a Course: Developing Learning Outcomes | 1:16:45 | 500 | |
| 1. What is Computation? | 43:60 | 42,495 | |
|
|