|
Even though great strides have been made at UC Davis in promoting the goals of DEI in our classrooms, anecdotally we know that many LGBTQIA+ students continue to feel invisible and that their needs…
|
|
|
|
Unlock powerful connections by fostering across the causeway relationships. This is an interactive, break out group program. Facilitators: Kim DeVaughn, Training Analysts, UC Davis Campus and Health…
|
|
In this talk, presenters will share some highlights and key takeaways from an ongoing study on student experiences and perceptions of hybrid (or "blended") writing courses at UC Davis.…
|
|
|
|
|
|
|
|
Did you know that 80% of all jobs are found through networking? Career networking can improve your chances of landing a job, and can be an invaluable tool in your long-term career success. In this…
|
|
Take your LinkedIn profile to the next level, and maximize how to use it as a job search tool. In this workshop, which builds upon LinkedIn 101, you will discover how to identify useful connections,…
|
|
“UC Davis builds a Service Hub that offers the Total Experience” - a project to improve customer experience - has won a Golden award from the University of California's Larry L.…
|
|
This video walks through how to set up your computer equipment when returning to the office. Knowledge article quick links: Who is my IT contact? - KB0000457 Workstation Setup - Quick Start Guide -…
|
|
First club meeting; a brief overview of neuromorphic computing in comparison to both biological brains and Von Neumann computers. A short discussion of ABR's Nengo library and Intel's Loihi…
|
|
This tutorial goes over how to use the Ubuntu command screen. Screen or GNU Screen is a terminal multiplexer. In other words, it means that you can start a screen session and then open any number of…
|
|
Foundations of Computer and Information Security. This covers network flooding attacks anf the Chinese Wall model. The class starts at 7:37 into the video.
|
|
Foundations of Computer and Information Security. This covers state-based availability models and some defenses against network flooding attacks. The class starts at 8:56 into the video.
|
|
Cynthia Tang is a second year PhD student in the Zivkovic Lab.
|