813 search results

Inclusive Leadership: Effecting change
Education & Development

Inclusive Leadership: Effecting change

...de-construct and reconstruct institutions, social norms and cultural knowledge; they seek to transform individuals and organisations; and they wish to encourage activism and moral courage, recognising the challenges and tensions in the lives we live...Inclusive Leadership: Effecting change: 2.2 How different is difference? - Another central challenge is that all these...
Gweithio hybrid: dechrau yn y gweithle
Money & Business

Gweithio hybrid: dechrau yn y gweithle

...math gwahanol o symudedd cymdeithasol. A cheir arweiniad yn yr adroddiad ar sut y gallwch chi, fel sefydliad, dim ots beth yw eich maint na'ch adnoddau na'ch arbenigedd yn y maes hwn, fesur amrywiaeth gymdeithasol eich gweithlu. Ceir arweiniad hefyd ar sut y gallwch gefnogi unigolion penodol i ddatgloi'r potensial sydd ganddynt a'u cynnydd yn eich sefydliad. Mae dysgu a...
A Europe of the Regions?
Society, Politics & Law

A Europe of the Regions?

...de Calais) rather than a history of cooperation on which to build...A Europe of the Regions?: 4.4 The Committee of the Regions - The regions, however, have a privileged place in EU integration, and the Committee of the Regions has the status of an ‘expert’ which must be consulted on issues of cross-border cooperation. This Committee epitomises both the growth of EU...
Level 2: Intermediate 8 hrs
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST) Badge icon
Digital & Computing

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

...DES, triple DES, and AES, which are widely used in financial transactions over the internet and within banks. Let's go back to Alice and Bob. Aware that Eve wants to learn their secret, they choose to use symmetric encryption. The first thing for them to do is to generate a shared key and each to make their own copy. One way of doing this is to meet, discuss their...
Introduction to cyber security: stay safe online Badge icon
Digital & Computing

Introduction to cyber security: stay safe online

...DES, triple DES, and AES, which are widely used in financial transactions over the internet and within banks. Let's go back to Alice and Bob. Aware that Eve wants to learn their secret, they choose to use symmetric encryption. The first thing for them to do is to generate a shared key and each to make their own copy. One way of doing this is to meet, discuss their...
Exploring sport online: Athletes and efficient hearts
Health, Sports & Psychology

Exploring sport online: Athletes and efficient hearts

...De-hydration can lead to a very poor performance so keeping optimally hydrated throughout the day as well as during training and competition is very important. Often carrying a large bottle of water with you is the best way to ensure you drink throughout the day. Audio 1 Mick Curry The diet is very, very important. It’s no good doing what some people do and eating junk...
Herodotus and the invention of history
History & The Arts

Herodotus and the invention of history

...de Dieu by Maître François, between 1475 and 1480 CE. That is not all. This is also a story about Herodotus’ brand of history. At first glance, this episode, on which Herodotus leads on seems curiously trivial, even gossipy. Yet by taking us into the bedroom Herodotus promises insight into power dynamics that have repercussions for an entire kingdom and beyond. Much...
Cyflwyniad i greu newid gwleidyddol a chymdeithasol
Society, Politics & Law

Cyflwyniad i greu newid gwleidyddol a chymdeithasol

...math o etholiad a lle rydych chi’n byw yn y DU. Rhaid i chi fod yn 18 oed i bleidleisio yn Etholiad Cyffredinol Senedd y DU. Gallwch bleidleisio’n bersonol, drwy’r post, neu gael dirprwy (gofyn i rywun bleidleisio drosoch)...Cyflwyniad i greu newid gwleidyddol a chymdeithasol: 2.1 Codi eich mater yn Senedd y DU - P’un ai a yw’r mater rydych chi’n teimlo’n...