|
What is a River? Nature, Culture, and Human Psyche
|
|
This interview is with James Clegg, Professor Emeritus of Molecular and Cellular Biology in the College of Biological Science. Jim was appointed in 1986 as Professor and Director of the UC Davis…
|
|
Even though great strides have been made at UC Davis in promoting the goals of DEI in our classrooms, anecdotally we know that many LGBTQIA+ students continue to feel invisible and that their needs…
|
|
|
|
Unlock powerful connections by fostering across the causeway relationships. This is an interactive, break out group program. Facilitators: Kim DeVaughn, Training Analysts, UC Davis Campus and Health…
|
|
In this talk, presenters will share some highlights and key takeaways from an ongoing study on student experiences and perceptions of hybrid (or "blended") writing courses at UC Davis.…
|
|
|
|
|
|
|
|
Did you know that 80% of all jobs are found through networking? Career networking can improve your chances of landing a job, and can be an invaluable tool in your long-term career success. In this…
|
|
Take your LinkedIn profile to the next level, and maximize how to use it as a job search tool. In this workshop, which builds upon LinkedIn 101, you will discover how to identify useful connections,…
|
|
“UC Davis builds a Service Hub that offers the Total Experience” - a project to improve customer experience - has won a Golden award from the University of California's Larry L.…
|
|
This video walks through how to set up your computer equipment when returning to the office. Knowledge article quick links: Who is my IT contact? - KB0000457 Workstation Setup - Quick Start Guide -…
|
|
First club meeting; a brief overview of neuromorphic computing in comparison to both biological brains and Von Neumann computers. A short discussion of ABR's Nengo library and Intel's Loihi…
|
|
This tutorial goes over how to use the Ubuntu command screen. Screen or GNU Screen is a terminal multiplexer. In other words, it means that you can start a screen session and then open any number of…
|
|
Foundations of Computer and Information Security. This covers network flooding attacks anf the Chinese Wall model. The class starts at 7:37 into the video.
|