Search for tag: "systems"

The unseen carbon cycle: Amines to an end | Kelly Wrighton, Colorado State University

Dr. Kelly Wrighton take us on a methylated amines journey, from discussing her research on using microbiomes to predict atherosclerotic disease in humans to understanding how microbe could constrain…

From  Nichole Ginnan 0 likes 15 plays 0  

Microbiome Analysis as a Surveillance Tool to Detect and Track Plant Pathogen Threats | Veronica Roman-Reyna, PhD

Dr. Roman-Reyna, who started the lab at Penn State in Fall 2023, introduced her research goals and experience, including her vast work with different metagenomic sequencing methods and analyses. A…

From  Nichole Ginnan 0 likes 1 plays 0  

L06: Current and Future Architect Views (EA 871)

From  IST Learning Design 0 likes 25 plays 0  

L02b: Guest Lecture, Scott Bernard: The Value and Risk of Holistic Enterprise Architecture (EA 871)

From  IST Learning Design 0 likes 28 plays 0  

L01 - Overview of Enterprise Architecture (EA 871)

From  IST Learning Design 0 likes 57 plays 0  

PHS 571 - Course Overview

From  Chulapol Thanomsing 0 likes 63 plays 0  

L02e: Summary Treemap View (IST 868)

From  IST Learning Design 0 likes 37 plays 0  

12.5: HIT Benefits + Concerns, part 2

From  Aimee Brown-Shadduck 0 likes 24 plays 0  

L03b: Agent Architecture

From  IST Learning Design 0 likes 10 plays 0  

L04: Agent Communication (IST 555)

From  IST Learning Design 0 likes 11 plays 0  

L12: Conclusion and Wrap Up

From  IST Learning Design 0 likes 13 plays 0  

Rebekah Dawson - The Department of Astronomy and Astrophysics at Penn State

From  Eric Ford 0 likes 0 plays 0  

Eric Ford - The Department of Astronomy and Astrophysics at Penn State

From  Eric Ford 0 likes 1 plays 0  

L09a: Cybersecurity Projects (IST 830)

From  IST Learning Design 0 likes 20 plays 0  

LOG4J vulnerability the most serious I've seen in my decades-long career: CISA director

Direct YouTube Link: https://youtu.be/XxC5XblLhPw CNBC's Eamon Javers reports on the Log4J vulnerability and its potential to do great damage. Jen Easterly, CISA director, says it's the…

From  IST Learning Design 0 likes 1 plays 0  

The Difference Between Business Continuity and Disaster Recovery

Direct YouTube link: https://youtu.be/qfjWhAmWYL8

From  IST Learning Design 0 likes 7 plays 0