Search for tag: "security"

Expander graphs, modular forms and cryptography, Luca De Feo

This public lecture was part of the Foundations and Applications of Lattice-based Cryptography workshop at ICMS. We were delighted to welcome speaker Luca De Feo to give this talk. Alice and the…

From  Iain Cms 0 likes 6 plays 0  

Rice Production: Transplanted Rice

As we mentioned when looking at lowland irrigated rice, the method of establishing the rice in nurseries and then transplanting into fields has higher methane emissions than direct seeding. In…

From  Sarah Dunn 0 likes 2 plays 0  

Rice Production: Irrigated Lowland Rice

Rice is produced in a wide variety of biomes, and this led to a diversity in production systems. It is grown in high altitudes such as the Himalayas, as well as tropical, subtropical and temperate…

From  Sarah Dunn 0 likes 2 plays 0  

Rice Production: Introduction

One of the largest quantities of grains produced globally is rice. Around 500 million tonnes of rice are consumed annually. Over a billion people rely on rice as a key element of daily diets. There…

From  Sarah Dunn 0 likes 5 plays 0  

COP26 Debrief: Food Security with Dr Annis Richardson

In the second episode of our COP26, Chris (@donohoho) chats to Dr Annis Richardson (@Dr_AnnisR) about her research on food security. With climate change causing extreme weather, crop growth is…

From  Liz Gaberdiel 0 likes 1 plays 0  

Benedetta Catanzariti: Coding the Face: Making Sense of Affective Data

Controversies in the Data Society

From  James Stewart 0 likes 15 plays 0  

Making the most of IT 2021

This video introduces new students to the main IT (information technology) and learning technology services at the university. Find out how to: Activate your email account and register for…

From  Christina Hussell 0 likes 287 plays 0  

Ross Anderson: Security Engineering and Machine Learning (ICSA Colloquium / SPT Seminar 17/06/21)

Statistical machine-learning techniques have been used in security applications for over 20 years, starting with spam filtering, fraud engines and intrusion detection. In the process we have…

From  Sam Ainsworth 0 likes 382 plays 0  

Security Engineering -- Trailer

A brief introduction to the concepts covered in our new course in Security Engineering (10 credits, Informatics UG4/5/MSc, Semester 2).

From  Sam Ainsworth 0 likes 187 plays 0  

Cyber Security, Privacy and Trust MSc

Learn about the Cyber Security, Privacy and Trust MSc at the School of Informatics in this presentation delivered by Programme Director, Myrto Arapinis. This MSc in Cyber Security, Privacy and Trust…

From  Nicola Hopper 0 likes 66 plays 0  

How-To be secure at University

How-To be secure at University

From  Ravinder Panesar 0 likes 35 plays 0  

Global Health Challenges Intro Course - Big Food Part 2 2020-11-9

Big Food Pt 2: Lindsay Jaack

From  Michelle Hart 0 likes 35 plays 0  

Global Health Challenges Intro Course - Big Food Part 1 2020-11-9

Big Food Part 1: Lindsay Jaacks

From  Michelle Hart 0 likes 52 plays 0  

The Sustainability of Safety, Security and Privacy | Professor Ross Anderson | Distinguished Lecture | School of Informatics

Recording of Research and the “AI Revolution” - a School of Informatics Distinguished Lecture presented by Professor Christopher Bishop on 5 October 2020. Ross Anderson is Professor of…

From  Heather Mccomb 0 likes 99 plays 0  

Sustainable Food Systems

Dr Fiona Borthwick introduces you to the key stages of the food system and how they are linked. We will look at the increasing global nature of food systems, the basic concept of sustainability and…

From  Lizzy Garner-Foy 0 likes 139 plays 0  

How To Keep Your Mobile Device Secure

This talk provides a high level overview of mobile phones and the security landscape they operate within. The attack surface along with examples of threats are highlighted along with top ten security…

From  Ravinder Panesar 0 likes 17 plays 0