Added 1 month ago | 00:02:31 | 483 views
A letter from Marie Antoinette, Queen of France, to Cardinal Ignazio Boncompagni Ludovisi, 1782. The "Removable Paper Lock" format, a ceremonial-type correspondence, was used by French Kings (Louis XIV, Louis XV, and Louis XVI) and Que...
Added 1 month ago | 00:00:27 | 237 views
Letterlocking: Document in a Textile Bag, Italy. 1578. Was this once a locked document? Did the textile bag serve as an envelope and was once sewn shut? The original is found in the Vatican Secret Archives, Fondo Veneto, Sezione II, Con...
Added 1 month ago | 00:04:45 | 262 views
Letterlocking: Blank margin lock. Model of the highest level of built-in security found in letterlocking since the paper lock remains attached to the actual letter it is securing shut. Sir Robert Harley, Misc 28, Letter 2 of Hry Howard ...
Added 7 months ago | 00:00:22 | 3464 views
This letterlocking format was used exclusively by Russian Soldiers during World War II. Sealing the letter shut was forbidden. The format could be easily identified, opened by censors and reviewed, refolded and send forward to the intend...
Added 9 months ago | 00:01:38 | 1456 views
Professor Areg Danagoulian is working on developing a monochromatic beam source that emits at a fixed energy level, making active scanning of cargo for the presence of fissionable, fissile, nuclear materials and devices faster and more...
Added 1 year ago | 00:03:35 | 2191 views
Computing devices are everywhere. We use them to communicate with each other, buy products, and manage our accounts. Because they’re so essential, it’s critical that we safeguard these devices and the information on them. To learn best...
Added 2 years ago | 00:00:33 | 2034 views
All engineering disciplines interact with society, but nuclear engineering is a special case, inexorably bound up with critical issues of our era: energy, the environment, and international security. Developing a deeper understanding of ...
Added over 2 years ago | 00:03:33 | 2522 views |
Does your laptop or desktop computer contain sensitive data, such as Social Security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? If so, MIT policy and Massachusetts r...
Added over 2 years ago | 00:15:26 | 2375 views
This is the Final Presentation of the "Binvention" Team in the ESD.40 - Product Design and Development final class presentations given May 11, 2012. This team placed 3rd in the class competition.
- Architecture & Planning
- Diversity & Inclusion
- Finance & Economics
- Global Awareness & Action
- How To
- Humanities, Arts and Social Sciences
- International Affairs
- Just for Fun/Humor
- Life at MIT
- MIT Alum
- National Security
- Public Policy
- Videoblogging or Autobiographical