2016-09-09

A brief history of graffiti - Kelly Wall


source: TED-Ed     2016年9月8日
View full lesson: http://ed.ted.com/lessons/a-brief-his...
Spray-painted subway cars, tagged bridges, mural-covered walls – graffiti pops up boldly throughout our cities. And it turns out: it’s nothing new. Graffiti has been around for thousands of years. And across that span of time, it’s raised the same questions we debate now: Is it art? Is it vandalism? Kelly Wall describes the history of graffiti.
Lesson by Kelly Wall, animation by Tomás Pichardo Espaillat.

Training Anomalous Cognition with Edwin C. May


source: New Thinking Allowed     2016年8月17日
Edwin C. May, PhD, was involved in the military intelligence psychic spying program, popularly referred to as Stargate, for over twenty years. During the last decade, he was the director of research for that program. In this context, he produced over a hundred scientific publications. His academic training was in experimental nuclear physics. He is coauthor of ESP Wars: East and West and also Anomalous Cognition: Remote Viewing Research and Theory. He is the coeditor of a two volume anthology titled Extrasensory Perception: Support, Skepticism, and Science.
Here he addresses misconceptions about the possibilities of remote viewing training. He states that statistical analysis of the U.S. government’s twenty-year remote viewing project failed to yield evidence that any training methods were successful. At least three different approaches were involved, including the methodology developed by Ingo Swann that has become the basis for several commercial training approaches. Nevertheless, May believes that many tips can aid remote viewers. Furthermore, having a supportive social environment is extremely helpful.

New Thinking Allowed host, Jeffrey Mishlove, PhD, is author of The Roots of Consciousness, Psi Development Systems, and The PK Man. Between 1986 and 2002 he hosted and co-produced the original Thinking Allowed public television series. He is the recipient of the only doctoral diploma in "parapsychology" ever awarded by an accredited university (University of California, Berkeley, 1980). He is a past vice-president of the Association for Humanistic Psychology; and is the recipient of the Pathfinder Award from that Association for his contributions to the field of human consciousness exploration. He is also past-president of the non-profit Intuition Network, an organization dedicated to creating a world in which all people are encouraged to cultivate and apply their inner, intuitive abilities.
(Recorded on June 17, 2016)

Slavoj Zizek - Lecture On Violence (1-5)

# playlist (click the up-left corner of the videos)

source: Eidos84     2010年9月6日

Walter Kaufmann: Nietzsche and the Crisis in Philosophy


source: Eidos84    2011年1月7日
"Nietzsche and the Crisis in Philosophy", the second part of Walter Kaufmann's 1960 lecture series. Kaufmann first discusses the general crisis in modern philosophy, before focusing on the important contributions of Friedrich Nietzsche. Kaufmann pictures Nietzsche as a revolutionary heretic and the embodiment of the Socratic spirit. He traces in Nietzsche's works the craving for intellectual integrity, his break with Richard Wagner over the composer's anti-Semitic and anti-French sentiments, and ultimately, his madness, ascribed to having "burned himself out."

Computer Go by Daniel Bump


source: Stanford     2016年8月2日
From the Interactive Media & Games Seminar Series; Daniel Bump, Professor of Mathematics at Stanford University considers the problem of Go programming, why it is difficult, and looks at GNU Go's algorithms. Then he looks at two subsequent subject developments, namely Monte Carlo methods and Deep Learning. Finally, we will review a few moves from the recent AlphaGo-Lee Sedol match.

Taylor Conroy & Jesse Israel: "The Modern Quest for Human Connection" | ...


source: Talks at Google    2016年8月24日
Fireside chat with Taylor Conroy, co-founder of Journey (transformational travel company) and Jesse Israel, founder of The Big Quiet (mass meditation events in NYC) and MediClub (Meditation circles in NYC). both speakers describe their experience on how to travel with purpose, create human connection and mindful communities.

Jim Koch: "Quench Your Own Thirst" | Talks at Google


source: Talks at Google    2016年8月5日
Warning: This talk contains language that may be offensive to some viewers.
Boston Beer Company founder and chairman Jim Koch visited Google's office in Cambridge, MA to discuss his book, "Quench Your Own Thirst: Business Lessons Learned Over a Beer or Two".
In 1984, Koch left his consulting job and started a small brewery in Boston, using a family recipe to create a beer that would start the craft beer revolution in the U.S. His book offers unique insights into the whirlwind ride from scrappy start-up to thriving public company. His innovative business model and frank stories offer counterintuitive lessons that you can apply to business and to life.
Host: Brian Cusack
The book is available on Google Play Books: https://goo.gl/bnm6VW

Ego Is a Veneer for Profound Weakness | Ryan Holiday


source: Big Think    2016年8月4日
The advertising legend Ryan Holiday, who maintains a humble profile, speaks to the difference between confidence and ego, exposing the latter as a thin veneer concealing weakness. Holiday's book is "Ego Is The Enemy" (http://goo.gl/T5lxKz).
Read more at BigThink.com: http://bigthink.com/videos/ryan-holid...

Transcript - One of the things that psychologist talk about is threatened egotism, what happens with someone who has a very strong sense of ego is challenged in some fundamental way. So you can take – one of the stories I tell in the book that I think is interesting is there's this famous encounter between Angela Merkel and Vladimir Putin. And in an attempt to intimidate her in a state meeting he had heard that she was afraid of dogs. So he lets a dog come into the room in an attempt at basically to intimidate and to scare her. And so if Angela Merkel had been coming from a place of ego and obviously from fear she's going to react to this sort of petty attempt at intimidation with perhaps an attempt of her own with some saber rattling with any number of these things.
But instead she's got a sense of confidence I would say instead of ego that she's not going to react emotionally to this. She's not going to take it as a threat to her honor. It's not going to escalate into being more than what it is, in fact she ends up making a joke about it and it makes Putin look like the weaker bully in this case. But you can see how a different leader when this is revealed, when this attempt to do something is revealed would react in a dangerous way. You could think of one of the examples they use when they talk about threatened egotism is like a gang member whose honor is impugned, the way that they respond is obviously terrible for both parties involved. They escalate a verbal wound into violence and makes a non-serious situation into a serious one. And so what I'm trying to talk about then is if we have this sensitive ego and we're able to be wounded and instead of looking at that wound and sort of seeing it for what it is, we have to react emotionally. We have to react to compensate for the way that we feel that we've been harmed. It can create really dangerous situations very quickly. And often we think ego is supposed to be strength, but in fact it's a just a sort of veneer for a profound weakness and it's the compensation for that that creates bad situations. Read Full Transcript Here: http://goo.gl/FNZJXY.

A. W. Date: Convective Heat and Mass Transfer (IIT Bombay)

# playlist of the 43 videos (click the up-left corner of the video)

source: nptelhrd    2015年4月17日
Mechanical - Convective Heat and Mass Transfer by Prof. A. W. Date, Department of Mechanical Engineering, IIT Bombay. For more details on NPTEL visit http://nptel.ac.in

01 Introduction 32:39
02 Flow Classifications 32:02
03 Laws of Convection 39:58
04 Scalar Transport Equations 24:23
05 Laminar Boundary Layers  50:43
06 Similarity Method 40:00
07 Similarity Solns Velocity BL 36:40
08 Similarity Solns Temperature BL-I 37:17
09 Similarity Solns Temperature BL-II 36:57
10 Integral BL Equations 26:13
11 Integral Solns Laminar Velocity BL 48:08
12 Integral Solns Laminar Temperature BL 49:34
13 Superposition Theory 28:36
14 Laminar Internal Flows 44:16
15 Fully-Developed Laminar Flows- 1 30:42
16 Fully-Developed Laminar Flows- 2 34:38
17 Fully-Developed Laminar Flows Heat Transfer - 1 48:54
18 Fully-Developed Laminar Flows Heat Transfer - 2 49:22
19 Laminar Internal Developing Flows Heat Transfer 34:18
20 Superposition Technique 26:02
21 Nature of Turbulent Flows 47:05
22A Sustaining Mechanism of Turbulence- 1 46:46
23 Sustaining Mechanism of Turbulence- 2 42:12
24 Near-Wall Turbulent Flows - 1 50:33
25 Near-Wall Turbulent Flows - 2 31:06
26 Turbulence Models - 1 41:07
27 Turbulence Models - 2 42:29
28 Turbulence Models - 3 49:35
29 Prediction of Turbulent Flows 51:55
30 Prediction of Turbulent Heat Transfer 39:22
31 Convective Mass Transfer 48:49
32 Stefan Flow Model 45:47
33 Couette Flow Model 32:35
34 Reynolds Flow Model 44:35
35 Boundary Layer Flow Model 32:07
36 Evaluation of g and Nw 28:00
37 Diffusion Mass Transfer Problems 43:07
38 Convective MT Couette Flow 39:14
39 Convective MT Reynolds Flow Model - 1 44:39
40 Convective MT Reynolds Flow Model - 2 22:05
41 Natural Convection 51:54
42 Diffusion Jet Flames 48:58
22B Sustaining Mechanism of Turbulence- 1 32:47

P. C. Deshmukh: Special/Select Topics in the Theory of Atomic Collisions and Spectroscopy (IIT Madras)

# playlist of the 46 videos (click the up-left corner of the video)

source: nptelhrd    2015年4月23日
Physics - Special/Select Topics in the Theory of Atomic Collisions and Spectroscopy by Prof. P. C. Deshmukh, Department of Physics, IIT Madras. For more details on NPTEL visit http://nptel.ac.in

Mod-01 Lec-01 Introduction to the STiTACS course 37:18
Mod-01 Lec-02 Quantum Theory of collisions 48:59
Mod-01 Lec-03 Quantum Theory of collisions: Optical Theorem 54:49
Mod-01 Lec-04 Quantum Theory of collisions: optical Theorem 54:09
Mod-01 Lec-05 Quantum Theory of collisions: Differential scattering cross section 46:03
Mod-01 Lec-06 Quantum Theory of collisions Differential scattering cross section,Partial wave 40:29
Mod-01 Lec-7 Quantum Theory of collisions: Optical Theorem -- Unitarity of the Scattering Operator 1:01:30
Mod-01 Lec-08 Quantum Theory of collisions: Reciprocity Theorem, Phase shift analysis 49:18
Mod-01 Lec-09 Quantum Theory of collisions: More on Phase shift analysis 46:32
Mod-01 Lec 10 Quantum Theory of collisions: resonant condition in the l th partial wave. 47:01
Mod-01 Lec -11 Quantum Theory of collisions: Levinson's theorem 53:30
Mod-01 Lec 12 Quantum Theory of collisions: Levinson's theorem. 58:52
Mod-02 Lec-13 Many body theory, electron correlations 56:33
Mod-02 Lec-14 Second Quantization Creation, Destruction and Number operators 1:05:03
Mod-02 Lec-15 Many-particle Hamiltonian & Schrodinger Equation in 2nd Quantization,1:22:18
Mod-03 Lec-16 Many-electron problem in quantum mechanics 1:08:14
Mod-03 Lec-17 Hartree-Fock Self-Consistent-Field 58:16
Mod-03 Lec-18 Exchange, Statistical, Fermi-Dirac correlations 37:42
Mod-03 Lec-19 Limitations of the Hartree-Fock Self-Consistent-Field formalism 1:02:11
Mod-03 Lec-20 Many-Body formalism, II Quantization 1:02:08
Mod-03 Lec-21 Density fluctuations in an electron gas 52:58
Mod-03 Lec-22 Bohm-Pines approach to Random Phase Approximation 1:04:46
Mod-03 Lec-23 Bohm-Pines approach to Random Phase Approximation. 40:14
Mod-03 Lec-24 Bohm-Pines approach to Random Phase Approximation.. 49:28
Mod-04 Lec-25 Schrodinger, Heisenberg and Dirac "pictures" of QM 58:22
Mod-04 Lec-26 Dyson's chronological operator 50:47
Mod-04 Lec-27 Gell-Mann-Low Theorem 54:56
Mod-04 Lec-28 Reyleigh-Schrodinger perturbation methods and adiabatic switching 53:30
Mod-04 Lec-29 Feynman Diagrams 51:10
Mod-04 Lec-30 I Order Feynman Diagrams 1:15:17
Mod-04 Lec-31 Some more I Order Feynman Diagrams 1:02:18
Mod-04 Lec-32 II and higher order Feynman Diagrams. 56:50
Mod-05 Lec-33 Lippman Schwinger equation of potential scattering 44:35
Mod-05 Lec-34 Born Approximation 45:30
Mod-05 Lec-35 Coulomb scattering 1:23:35
Mod-06 Lec-36 Scattering of partial waves 41:44
Mod-06 Lec-37 Scattering at high energy 41:23
Mod-06 Lec-38 Resonances in Quantum Collisions 1:02:20
Mod-06 Lec-39 Breit-Wigner Resonances 47:25
Mod-07 Lec-40 Fano parameterization of Breit-Wigner formula 54:56
Mod-07 Lec-41 Discrete state embedded in the continuum 1:00:58
Mod-07 Lec-42 Resonance life times 37:45
Mod-07 Lec-43 Wigner-Eisenbud formalism of time-delay in scattering 27:34
Mod-08 Lec-44 Photoionization and Photoelectron Angular Distributions 49:55
Mod-08 Lec-45 Ionization and Excitation of Atoms by Fast Charged Particles 55:03
Mod-08 Lec-46 Photo-absorption by Free and Confined Atoms and Ions: Recent Developments 41:28

High Performance Computer Architecture by Ajit Pal (IIT Kharagpur)

# click the upper-left icon to select videos from the playlist

source: nptelhrd     2015年1月5日
Computer - High Performance Computer Architecture by Prof. Ajit Pal, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.ac.in

Mod-01 Lec-01 Introduction and Course Outline 54:58
Mod-02 Lec-02 Performance 55:33
Mod-03 Lec-03 Instruction Set Architecture 56:34
Mod-04 Lec-04 MIPS ISA Processor 52:05
Mod-04 Lec-05 MIPS ISA Processor (Contd.) 52:03
Mod-05 Lec-06 Pipelining Introduction 56:48
Mod-06 Lec-07 Instruction Pipelining 57:21
Mod-07 Lec-08 Pipeline Hazards 55:21
Mod-08 Lec-09 Data Hazards 51:00
Mod-09 Lec-10 Software Pipelining 45:50
Mod-10 Lec-11 In Quest of Higher ILP 58:06
Mod-10 Lec-12 In Quest of Higher ILP (Contd.) 57:50
Mod-11 Lec-13 Dynamic Instruction Scheduling 57:11
Mod-11 Lec-14 Dynamic Instruction Scheduling (Contd.) 57:40
Mod-12 Lec-15 Control Hazards 54:52
Mod-13 Lec-16 Branch Prediction 55:25
Mod-13 Lec-17 Branch Prediction (Contd.) 57:23
Mod-14 Lec-18 Dynamic Instruction Scheduling with Branch Prediction 54:06
Mod-15 Lec-19 Hardware Based Speculation 59:38
Mod-16 Lec-20 Tutorial - I 52:24
Mod-17 Lec-21 Hierarchical Memory Organization 56:50
Mod-17 Lec-22 Hierarchical Memory Organization (Contd.) 56:20
Mod-17 Lec-23 Hierarchical Memory Organization (Contd.) 59:44
Mod-17 Lec-24 Hierarchical Memory Organization (Contd.) 58:36
Mod-18 Lec-25 Cache Optimization Techniques (Contd.) 56:06
Mod-18 Lec-26 Cache Optimization Techniques (Contd.) 54:50
Mod-19 Lec-27 High Performance Computer Architecture 59:23
Mod-20 Lec-28 Main Memory Optimizations 54:26
Mod-21 Lec-29 Virtual Memory 56:05
Mod-21 Lec-30 Virtual Memory (Contd.) 55:29
Mod-22 Lec-31 Virtual Machines 57:08
Mod-23 Lec-32 Storage Technology 56:31
Mod-23 Lec-33 Storage Technology (Contd.) 54:16
Mod-24 Lec-34 Case Studies 58:09
Mod-24 Lec-35 Case Studies (Contd.) 48:52
Mod-24 Lec-36 Case Studies (Contd.) 56:54
Mod-25 Lec-37 Multithreading and Multiprocessing 54:26
Mod-26 Lec-38 Simultaneous Multithreading 55:25
Mod-28 Lec-40 Distributed Memory Multiprocessors 54:45
Mod-29 Lec-41 Cluster, Grid and Cloud Computing 55:53
Mod-27 Lec-39 Symmetric Multiprocessors 57:16

Computer Architecture by Anshul Kumar (IIT Delhi)

# click the upper-left icon to select videos from the playlist

source: nptelhrd    2008年9月29日
Computer Sc - Computer Architecture by Prof. Anshul Kumar, Department of Computer Science & Engineering, IIT Delhi.

Lecture -1 Introduction to Computer Architecture 53:21
Lecture -2 History of Computers 35:15
Lecture -3 Instruction Set Architecture - I 52:18
Lecture -4 Instruction Set Architecture - II 51:42
Lecture -5 Instruction Set Architecture - III 52:44
Lecture -6 Recursive Programs 47:03
Lecture -7 Architecture Space 48:40
Lecture -8 Architecture Examples 50:48
Lecture -9 Performance 50:29
Lecture -10 Performance 52:58
Lecture -11 Binary Arithmetic, ALU Design 50:30
Lecture -12 ALU Design, Overflow 49:48
Lecture -13 Multiplier Design 51:36
Lecture -14 Divider Design 54:37
Lecture -15 Fast Addition , Multiplication 1:01:21
Lecture -16 Floating Point Arithmetic 51:39
Lecture -17 Processor Design - Introduction 40:04
Lecture -18 Processor Design 45:50
Lecture -19 Processor Design - Simple Design 50:03
Lecture -20 Processor Design - Multi Cycle Approach 40:56
Lecture - 21 Processor Design - Control for Multi Cycle 56:43
Lecture - 22 Processor Design Micro programmed Control 33:11
Lecture - 23 Processor Design Exception Handling 56:01
Lecture - 24 Pipelined Processor Design Basic Idea 54:15
Lecture - 25 Pipelined Processor Design: Datapath 48:37
Lecture - 26 Pipelined Processor Design: Handling Data 37:28
Lecture - 27 Pipelined Processor Design 55:41
Lecture - 28 Memory Hierarchy : Basic Idea 48:10
Lecture - 29 Memory Hierarchy : Cache Organization 53:34
Lecture - 30 Memory Hierarchy : Cache Organization 49:08
Lecture - 31 Memory Hierarchy : Virtual Memory 45:41
Lecture - 32 Memory Hierarchy : Virtual Memory 50:11
Lecture - 33 Input / Output Subsystem: Introduction 49:53
Lecture - 34 Input / Output Subsystem: Interfaces and buses 54:21
Lecture - 35 Input / Output Subsystem:Interfaces and buses 55:04
Lecture - 36 Input / Output Subsystem:I/O Operations 50:18
Lecture - 37 Input / Output Subsystem:Designing I/O Systems 51:30
Lecture - 38 Concluding Remarks 45:10