Vlogbrothers
Who Owns DFTBA? An Introduction to Trademarks
In which John discusses the increasingly widespread use by large corporations of the phrases "DFTBA" and "Don't forget to be awesome," and discusses why even though we COULD stop those uses by trademarking nerdfighter slogans, we aren't...
Vlogbrothers
We Have Destroyed Copyright Law
The internet destroyed copyright law and we have not re-built. Instead of laws and courts we now have claims and disputes. YouTube in particular has placed itself in the middle of extra-legal arbitrations over what is and is not fair...
Vlogbrothers
The Bizarre State of Copyright
In which Hank discusses what intellectual property is, and how copyright is increasingly being policed by dumb robots that don't have very much to do with the law, but have everything to do with it just being REALLY COMPLICATED and there...
National Institute of Standards and Technology
Roundtable on Federal Government Engagement in Standards
Recorded Tuesday, Jan. 25, 2011, at the Hoover Building in Washington, D.C. The U.S. Department of Commerce and NIST hosted a moderated panel discussion about what role the government should play in standards development and use and how...
Healthcare Triage
Innovation in a Changing US Health System
The US healthcare system has a lot of issues, but one thing it's got going for it is innovation. More clinical trials originate in the United States, and more Nobel Physiology and Medicine Laureates are from here than from any other...
Professor Dave Explains
How Governments Support Economic Growth
Now that we have discussed several types of economies with varying degrees of government involvement, it's time to get a closer look at a government's role in economic growth. It is possible for governments to both promote and hinder...
The Wall Street Journal
Cybersecurity Strategy Development Bootcamp
Alan Levine from the Carnegie Mellon, Heinz College, CMO program explores fundamental pillars of cybersecurity and underpinning practices.
Global Ethics Solutions
Care of Company Assets - What You Need to Know (Part 3)
This is the third of a four-part course on respecting company assets. This section covers the various kinds of assets in the workplace and guidelines for appropriately caring for those assets. This course provides the helpful information...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 1
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Global Health with Greg Martin
Access to Medicines (part IV). How to get a job!
In this video the panel continue the discussion on Access to Medicines and focus on "who is doing what" (and where a person might be able to find work in this space).
Global Health with Greg Martin
Access to Medicines (part III) - Intellectual Property
In this video the panel continue the series on Access to Medicines and focus on Intellectual Property issues.
Global Ethics Solutions
Protecting Confidential Information and Ethical Gift Giving in Business
This presentation introduces participants to various ethical decision-making models and then expands to cover common code of conduct topics. The emphasis of this course is to help employees develop solid ethical decision-making skills in...
Institute for New Economic Thinking
Legal Evil
From feudal land rights to intellectual property in the modern era, lawyers have been battling over capital for centuries. Typically leveraging social resources to generate and protect private wealth. Katharina Pistor (Columbia...
Bill Carmody
Transforming Legal Services: A Conversation with LegalZoom CEO John Suh
John Suh, CEO of LegalZoom, acknowledges that getting the legal aspects of your business right is a necessary evil. He shares his vision on how LegalZoom has maximized the efficiency and lowered the cost of having the right legal support...
The Wall Street Journal
Government Perspectives on the Cyber Threat Environment
Learn about the current cyber threat environment, what to expect on the horizon, and how federal agencies are helping to protect private industry.
National Institute of Standards and Technology
Forum on National Strategy for Trusted Identities in Cyberspace
This forum on the National Strategy for Trusted Identities in Cyberspace (NSTIC) was held at Stanford University on January 7, 2011. It featured presentations by Commerce Secretary Gary Locke and White House Cybersecurity Coordinator...
Global Ethics Solutions
Stewardship of Company Assets: Ethical Issues and Problems
Effective use of company assets is critical to the bottom line. Assets can be the tangible equipment, physical property, funds, or intangible things such as intellectual property and patents. This is the first of a four-part course on...
The Business Professor
Intentional Interference with Economic Relations
Intentional Interference with Economic Relations
The Wall Street Journal
When Hackers Strike What Do I Do?
What actions can a business be taking once they suffer a data breach?
The Wall Street Journal
Refocusing The U.S. vs. China Debate: The Future For Tech Innovation
At WSJ Tech Live, Ron Kirk, Clete Willems, Andy Purdy, and Edith Young debate the future roadmap for tech innovation in the U.S. and China.
Institute for New Economic Thinking
Coding Capital [Katharina Pistor]
This law is my law, this law is your law...Katharina Pistor (@Columbia Law School) explains how our legal system is manipulated to protect wealth, and why the rules of the game always seem just out of reach.
APMonitor
Data Analytics in Oil and Gas
Aasim Waheed has spent 23 years in oil and gas process automation. He started off as an electrical and controls engineer, moved into HCI design, commissioning, project management and finally into business management. He has been running...
Global Ethics Solutions
Stewardship of Company Assets: What You Need to Know
This is the third of a four-part course on respecting company assets. This section covers the various kinds of assets in the workplace and guidelines for appropriately caring for those assets. This course provides the helpful information...
The Wall Street Journal
'Reasonable Security' and the CCPA
In cybersecurity there is one immutable truth: nothing that touches the Internet is secure. Chris Swecker, formerly of the FBI's criminal investigative and cyber divisions discusses the role of IT compliance.