Skip to content

Filter pages by:

More filter options

Explore.
Watch, listen, debate & discover with our experts

RSS Icon
  • Copyrighted  image Icon Copyright: Dreamstime

    Programming for Selection

    Start learning how to program conditional JavaScript using if statements.

    Read now: Programming for Selection about Managing projects through people

    Article

    Level: 1 Introductory

    Updated on:

    24 Jun 2015

  • Programming for Selection

    Programming for Selection Copyrighted  image Icon Copyright: Dreamstime
    Introductory level Updated 24 Jun 2015
    Start learning how to program conditional JavaScript using if statements.
  • JavaScript Style and Layout

    A quick primer on some of the good practices and styles you should use when writing JavaScript.

    Read now: JavaScript Style and Layout about Managing projects through people

    Article

    Updated on:

    24 Jun 2015

  • JavaScript Style and Layout

    Updated 24 Jun 2015
    A quick primer on some of the good practices and styles you should use when writing JavaScript.
  • Copyrighted  image Icon Copyright: Getty images

    Free course: Learn to code for data analysis

    Do you want to learn more about programming to analyse and visualise data? OpenLearn has a range of courses, articles and more to give you a real flavour for the subject.

    Read now: Free course: Learn to code for data analysis about Managing projects through people

    Article

    Updated on:

    19 Jun 2015

  • Free course: Learn to code for data analysis

    Free course: Learn to code for data analysis Copyrighted  image Icon Copyright: Getty images
    Updated 19 Jun 2015
    Do you want to learn more about programming to analyse and visualise data? OpenLearn has a range of courses, articles and more to give you a real flavour for...
  • Copyright free  image Icon Copyright free: Public domain image

    Can animals predict earthquakes - and how could they alert us?

    By Yijun Yu, Dr Clara Mancini

    It might sound like something out of a Lassie film - animals warning of imminent disasters. But connecting animals to the cloud could give early warnings of earthquakes.

    Read now: Can animals predict earthquakes - and how could they alert us? about Managing projects through people

    Article

    Updated on:

    06 May 2015

  • Can animals predict earthquakes - and how could they alert us?

    Can animals predict earthquakes - and how could they alert us? Copyright free  image Icon Copyright free: Public domain image
    Updated 06 May 2015
    It might sound like something out of a Lassie film - animals warning of imminent disasters. But connecting animals to the cloud could give early warnings of...
  • Copyrighted  image Icon Copyright: EDV Project / Party leader images CC Plaid Cymru / Edinburgh Greens / Scottish Government / Gage Skidmore / Ed Miliband

    The Election Debate Visualisation Project

    Even though social media is thoroughly embedded in voters’ culture we have yet to come up with an engaging, interactive way to share our feedback on election debates, but perhaps all that is about to change.

    Read now: The Election Debate Visualisation Project about Managing projects through people

    Article

    10 mins

    Level: 1 Introductory

    Updated on:

    14 Apr 2015

  • The Election Debate Visualisation Project

    The Election Debate Visualisation Project Copyrighted  image Icon Copyright: EDV Project / Party leader images CC Plaid Cymru / Edinburgh Greens / Scottish Government / Gage Skidmore / Ed Miliband
    Introductory level Duration 10 mins Updated 14 Apr 2015
    Even though social media is thoroughly embedded in voters’ culture we have yet to come up with an engaging, interactive way to share our feedback on election...
  • Creative commons image Icon Eva Rinaldi under CC-BY-SA licence under Creative-Commons license

    Blackhat, dark night: Could hackers really cause a power outage?

    By Mike Richards

    Although the nuclear meltdown depicted in Blackhat is fiction, Mike Richards warns there are other ways those with bad intentions could switch our lights off...

    Read now: Blackhat, dark night: Could hackers really cause a power outage? about Managing projects through people

    Article

    10 mins

    Level: 1 Introductory

    Updated on:

    25 Feb 2015

  • Blackhat, dark night: Could hackers really cause a power outage?

    Blackhat, dark night: Could hackers really cause a power outage? Creative commons image Icon Eva Rinaldi under CC-BY-SA licence under Creative-Commons license
    Introductory level Duration 10 mins Updated 25 Feb 2015
    Although the nuclear meltdown depicted in Blackhat is fiction, Mike Richards warns there are other ways those with bad intentions could switch our lights off...
  • Creative commons image Icon yum9me under CC-BY-NC-ND licence under Creative-Commons license

    What do I need to know about the SIM hack?

    By Mike Richards

    Revelations that security forces have broken the protection of mobile phone technology are a real concern. Mike Richards explains why - and how the hack works.

    Read now: What do I need to know about the SIM hack? about Managing projects through people

    Article

    5 mins

    Updated on:

    25 Feb 2015

  • What do I need to know about the SIM hack?

    What do I need to know about the SIM hack? Creative commons image Icon yum9me under CC-BY-NC-ND licence under Creative-Commons license
    Duration 5 mins Updated 25 Feb 2015
    Revelations that security forces have broken the protection of mobile phone technology are a real concern. Mike Richards explains why - and how the hack...
  • Creative commons image Icon Gene Huntlicensedfor reuse under CC BY 2.0 under Creative-Commons license

    Meat here? Hunting for data about the food supply chain

    By Dr Tony Hirst

    What does that food supply chain look like? And what sorts of data are available that allow us to explore the operation of that supply chain?

    Read now: Meat here? Hunting for data about the food supply chain about Managing projects through people

    Article

    Level: 1 Introductory

    Updated on:

    19 Feb 2015

  • Meat here? Hunting for data about the food supply chain

    Meat here? Hunting for data about the food supply chain Creative commons image Icon Gene Huntlicensedfor reuse under CC BY 2.0 under Creative-Commons license
    Introductory level Updated 19 Feb 2015
    What does that food supply chain look like? And what sorts of data are available that allow us to explore the operation of that supply chain?
  • Mass surveillance will never be able to stop all known terrorists

    By Ray Corrigan

    The government believes mass surveillance can keep us safe from harm. Ray Corrigan suggests those plans need a closer look.

    Read now: Mass surveillance will never be able to stop all known terrorists about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    13 Jan 2015

  • Mass surveillance will never be able to stop all known terrorists

    Introductory level Duration 5 mins Updated 13 Jan 2015
    The government believes mass surveillance can keep us safe from harm. Ray Corrigan suggests those plans need a closer look.
  • Creative commons image Icon Ethan Prater under CC-BY-2.0 licence under Creative-Commons license

    Highlights and lowlights of 2014, a golden year for cybercrime

    By Andrew Smith

    In 2014 we learnt how powerful hackers and cyber criminals are, will this continue in to 2015? Andrew Smith takes a look back at the year of cybercrime. 

    Read now: Highlights and lowlights of 2014, a golden year for cybercrime about Managing projects through people

    Article

    10 mins

    Level: 1 Introductory

    Updated on:

    02 Jan 2015

  • Highlights and lowlights of 2014, a golden year for cybercrime

    Highlights and lowlights of 2014, a golden year for cybercrime Creative commons image Icon Ethan Prater under CC-BY-2.0 licence under Creative-Commons license
    Introductory level Duration 10 mins Updated 02 Jan 2015
    In 2014 we learnt how powerful hackers and cyber criminals are, will this continue in to 2015? Andrew Smith takes a look back at the year of cybercrime. 
  • Embarking on a career in cyber security

    By Arosha Bandara

    Are you interested in a career in cyber security? Find out what career paths you can take here.

    Read now: Embarking on a career in cyber security about Managing projects through people

    Article

    5 mins

    Updated on:

    22 Dec 2014

  • Embarking on a career in cyber security

    Duration 5 mins Updated 22 Dec 2014
    Are you interested in a career in cyber security? Find out what career paths you can take here.
  • Creative commons image Icon Ricardo Wanglicensed for reuse under CC BY-NC-SA 2.0 under Creative-Commons license

    Will there be a Silk Road 3.0?

    By Mike Richards

    After the Silk Road there was Silk Road 2.0, and now that’s gone. Will there be a Silk Road 3.0?

    Read now: Will there be a Silk Road 3.0? about Managing projects through people

    Article

    Updated on:

    28 Nov 2014

  • Will there be a Silk Road 3.0?

    Will there be a Silk Road 3.0? Creative commons image Icon Ricardo Wanglicensed for reuse under CC BY-NC-SA 2.0 under Creative-Commons license
    Updated 28 Nov 2014
    After the Silk Road there was Silk Road 2.0, and now that’s gone. Will there be a Silk Road 3.0?
  • Copyrighted  image Icon Copyright:

    Blaming Facebook for Lee Rigby’s murder is nonsense

    By Ray Corrigan

    Scapegoating Facebook for the murder of Lee Rigby is wrong and is being used for political gains, writes Ray Corrigan.

    Read now: Blaming Facebook for Lee Rigby’s murder is nonsense about Managing projects through people

    Article

    10 mins

    Level: 1 Introductory

    Updated on:

    27 Nov 2014

  • Blaming Facebook for Lee Rigby’s murder is nonsense

    Blaming Facebook for Lee Rigby’s murder is nonsense Copyrighted  image Icon Copyright:
    Introductory level Duration 10 mins Updated 27 Nov 2014
    Scapegoating Facebook for the murder of Lee Rigby is wrong and is being used for political gains, writes Ray Corrigan.
  • Copyrighted  image Icon Copyright: Flynt | Dreamstime.com

    Theresa May’s new Big Brother powers won’t help catch more criminals

    By Andrew Smith

    Enabling the police to identify who is using a digital device at any time won't catch up with the more advanced criminals, writes Andrew Smith. 

    Read now: Theresa May’s new Big Brother powers won’t help catch more criminals about Managing projects through people

    Article

    10 mins

    Level: 1 Introductory

    Updated on:

    26 Nov 2014

  • Theresa May’s new Big Brother powers won’t help catch more criminals

    Theresa May’s new Big Brother powers won’t help catch more criminals Copyrighted  image Icon Copyright: Flynt | Dreamstime.com
    Introductory level Duration 10 mins Updated 26 Nov 2014
    Enabling the police to identify who is using a digital device at any time won't catch up with the more advanced criminals, writes Andrew Smith. 
  • Creative commons image Icon Matt Katzenbergerlicensed for reuse under CC BY-NC-SA 2.0 under Creative-Commons license

    Everything you've ever wondered about Tor

    By Mike Richards

    We shine the light on the pros and cons of using Tor, a highly secure method of sending and receiving information across the Internet.

    Read now: Everything you've ever wondered about Tor about Managing projects through people

    Article

    Updated on:

    25 Nov 2014

  • Everything you've ever wondered about Tor

    Everything you've ever wondered about Tor Creative commons image Icon Matt Katzenbergerlicensed for reuse under CC BY-NC-SA 2.0 under Creative-Commons license
    Updated 25 Nov 2014
    We shine the light on the pros and cons of using Tor, a highly secure method of sending and receiving information across the Internet.
  • Creative commons image Icon Stéfanlicensed for reuse under CC BY-NC-SA 2.0 under Creative-Commons license
    Article

    Updated on:

    24 Nov 2014

  • The four horsemen of the Infocalypse

    The four horsemen of the Infocalypse Creative commons image Icon Stéfanlicensed for reuse under CC BY-NC-SA 2.0 under Creative-Commons license
    Updated 24 Nov 2014
    Why mass surveillance doesn't work. 
  • Creative commons image Icon Blixtlicensed for reuse under CC BY-NC-SA 2.0 under Creative-Commons license

    Streaming may suffocate the music industry – or save it

    By Mike Richards

    Can legal download services run by companies such as Apple, Spotify, or Amazon help to stamp out illegal piracy? 

    Read now: Streaming may suffocate the music industry – or save it about Managing projects through people

    Article

    Updated on:

    24 Nov 2014

  • Streaming may suffocate the music industry – or save it

    Streaming may suffocate the music industry – or save it Creative commons image Icon Blixtlicensed for reuse under CC BY-NC-SA 2.0 under Creative-Commons license
    Updated 24 Nov 2014
    Can legal download services run by companies such as Apple, Spotify, or Amazon help to stamp out illegal piracy? 
  • Creative commons image Icon Cory Doctorowlicensed for reuse under CC BY-SA 2.0 under Creative-Commons license

    Laws for the Internet Age

    By Cory Doctorow

    In this excerpt from his new book 'Information Doesn't Want To be Free: Laws for the Internet Age' Cory discusses 'Doctorow's First Law'.

    Read now: Laws for the Internet Age about Managing projects through people

    Article

    Updated on:

    14 Nov 2014

  • Laws for the Internet Age

    Laws for the Internet Age Creative commons image Icon Cory Doctorowlicensed for reuse under CC BY-SA 2.0 under Creative-Commons license
    Updated 14 Nov 2014
    In this excerpt from his new book 'Information Doesn't Want To be Free: Laws for the Internet Age' Cory discusses 'Doctorow's First Law'.
  • Creative commons image Icon The Open University under Creative Commons BY-NC-SA 4.0 license

    Cybercrime: What does it mean?

    Explore different types of cybercrime with this collection of animated videos.

    Read now: Cybercrime: What does it mean? about Managing projects through people

    Article

    Updated on:

    29 Oct 2014

  • Cybercrime: What does it mean?

    Cybercrime: What does it mean? Creative commons image Icon The Open University under Creative Commons BY-NC-SA 4.0 license
    Updated 29 Oct 2014
    Explore different types of cybercrime with this collection of animated videos.
  • Copyrighted  image Icon Copyright: Flynt | Dreamstime.com

    The Internet: It's not all bad

    By Mike Richards

    Don’t be afraid of the Internet; be wary, be cautious, but keep on using it. By taking some simple steps you can greatly reduce the risk to yourself and to your family.

    Read now: The Internet: It's not all bad about Managing projects through people

    Article

    Updated on:

    28 Oct 2014

  • The Internet: It's not all bad

    The Internet: It's not all bad Copyrighted  image Icon Copyright: Flynt | Dreamstime.com
    Updated 28 Oct 2014
    Don’t be afraid of the Internet; be wary, be cautious, but keep on using it. By taking some simple steps you can greatly reduce the risk to yourself and to...
  • Creative commons image Icon kleuske under CC BY-SA 2.0 licence under Creative-Commons license

    Spam, phishing and spoofing

    By Mike Richards

    Learn how to protect yourself against those who attempt to lure you to disclose confidential information. 

    Read now: Spam, phishing and spoofing about Managing projects through people

    Article

    Updated on:

    28 Oct 2014

  • Spam, phishing and spoofing

    Spam, phishing and spoofing Creative commons image Icon kleuske under CC BY-SA 2.0 licence under Creative-Commons license
    Updated 28 Oct 2014
    Learn how to protect yourself against those who attempt to lure you to disclose confidential information. 
  • Creative commons image Icon Tom Coates under CC BY-NC 2.0 licence under Creative-Commons license
    Article

    Updated on:

    28 Oct 2014

  • Introducing rootkits

    Introducing rootkits Creative commons image Icon Tom Coates under CC BY-NC 2.0 licence under Creative-Commons license
    Updated 28 Oct 2014
    Why do people use rootkits and what are they intended for?
  • Is Bitcoin legal?

    By Mike Richards

    Most of the world’s largest economies allow Bitcoin transfers without restriction but others have outlawed the currency.

    Read now: Is Bitcoin legal? about Managing projects through people

    Article

    Updated on:

    27 Oct 2014

  • Is Bitcoin legal?

    Updated 27 Oct 2014
    Most of the world’s largest economies allow Bitcoin transfers without restriction but others have outlawed the currency.
  • Mining new Bitcoins

    By Mike Richards

    New Bitcoins are introduced to the system by a computationally intensive process known as 'mining'.

    Read now: Mining new Bitcoins about Managing projects through people

    Article

    Updated on:

    27 Oct 2014

  • Mining new Bitcoins

    Updated 27 Oct 2014
    New Bitcoins are introduced to the system by a computationally intensive process known as 'mining'.
  • Creative commons image Icon Richard-G under CC BY 2.0 licence under Creative-Commons license

    How Bitcoin works

    By Mike Richards

    Everything you need to know to get started with Bitcoin. 

    Read now: How Bitcoin works about Managing projects through people

    Article

    Updated on:

    27 Oct 2014

  • How Bitcoin works

    How Bitcoin works Creative commons image Icon Richard-G under CC BY 2.0 licence under Creative-Commons license
    Updated 27 Oct 2014
    Everything you need to know to get started with Bitcoin. 

    Free OpenLearn courses.
    Free extracts from OU course materials

    RSS Icon
  • Copyright free  image Icon Copyright free: itkannan4u

    What happens to the poorest in a cashless society?

    The race to contactless transactions and virtual currency puts those with least at the most risk, warns Dana Kornberg

    Read now: What happens to the poorest in a cashless society? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    02 Aug 2017

  • What happens to the poorest in a cashless society?

    What happens to the poorest in a cashless society? Copyright free  image Icon Copyright free: itkannan4u
    Introductory level Duration 5 mins Updated 02 Aug 2017
    The race to contactless transactions and virtual currency puts those with least at the most risk, warns Dana Kornberg
  • Creative commons image Icon The Open University under Creative Commons BY-NC-SA 4.0 license

    Cybercrime: Rootkits

    In 2005 Sony BMG employed a novel Digital Rights Management method when they used something called a rootkit. But what is a rootkit?

    Watch now: Cybercrime: Rootkits about Managing projects through people

    Video

    5 mins

    Level: 1 Introductory

    Updated on:

    02 Aug 2017

  • Cybercrime: Rootkits

    Featuring: Video Video
    Cybercrime: Rootkits Creative commons image Icon The Open University under Creative Commons BY-NC-SA 4.0 license
    Introductory level Duration 5 mins Updated 02 Aug 2017
    In 2005 Sony BMG employed a novel Digital Rights Management method when they used something called a rootkit. But what is a rootkit?
  • What can emoji teach us about human civilization?

    By Dr Philip Seargeant

    Is emoji another example of the dumbing-down of our language and culture or is there a more educational purpose to the little pictures used to communicate?

    Read now: What can emoji teach us about human civilization? about Managing projects through people

    Article

    15 mins

    Level: 1 Introductory

    Updated on:

    18 Jul 2017

  • What can emoji teach us about human civilization?

    Introductory level Duration 15 mins Updated 18 Jul 2017
    Is emoji another example of the dumbing-down of our language and culture or is there a more educational purpose to the little pictures used to communicate?
  • Thoroughly Modern Millennials

    By Steve Woods

    How do Millennials want to learn? Does their use of new technologies require a more contemporary educational system?

    Read now: Thoroughly Modern Millennials about Managing projects through people

    Article

    15 mins

    Level: 1 Introductory

    Updated on:

    13 Jul 2017

  • Thoroughly Modern Millennials

    Introductory level Duration 15 mins Updated 13 Jul 2017
    How do Millennials want to learn? Does their use of new technologies require a more contemporary educational system?
  • Copyrighted  image Icon Copyright: Used with permission

    Natural intelligence

    One goal of artificial intelligence is to build machines that can operate in the real world with all its noise and uncertainty Much of what we want machines to do see recognise navigate move coordinate is already done very well by simple creatures In this free course Natural intelligence we look at how such creatures achieve these goals and start to understand how we can build machines with the same capabilities

    Learn: Natural intelligence more

    Free course

    10 hours

    Level: 3 Advanced

    Updated on:

    09 Jun 2017

  • Natural intelligence

    Free Course Free Course
    Natural intelligence Copyrighted  image Icon Copyright: Used with permission
    Advanced level Duration 10 hours Updated 09 Jun 2017
    One goal of artificial intelligence is to build machines that can operate in the...
  • After Manchester: The strength of the city

    Even as it coped with the shock, Manchester and its people displayed their strength of character. Caroline Cheetham tells how a Northern city rallied in the streets, and on social media.

    Read now: After Manchester: The strength of the city about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    24 May 2017

  • After Manchester: The strength of the city

    Introductory level Duration 5 mins Updated 24 May 2017
    Even as it coped with the shock, Manchester and its people displayed their strength of character. Caroline Cheetham tells how a Northern city rallied in the...
  • If Wannacry caused so much disruption, how come it raised so little money?

    Hundreds of thousands of computers locked across the globe - but Wannacry raised less than other ransomware attacks. Bill Buchanan explains why.

    Read now: If Wannacry caused so much disruption, how come it raised so little money? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    23 May 2017

  • If Wannacry caused so much disruption, how come it raised so little money?

    Introductory level Duration 5 mins Updated 23 May 2017
    Hundreds of thousands of computers locked across the globe - but Wannacry raised less than other ransomware attacks. Bill Buchanan explains why.
  • Copyrighted  image Icon Copyright: rawpixel

    Learning to swim in murky seas: Exploitation of the Electorate via Social Media

    By Dr Volker Patent

    Learn psychological self-defence and start resisting the dark arts of political communication, in Volker Patent’s second article on Brexit and the General Election

    Read now: Learning to swim in murky seas: Exploitation of the Electorate via Social Media about Managing projects through people

    Article

    10 mins

    Level: 2 Intermediate

    Updated on:

    19 May 2017

  • Learning to swim in murky seas: Exploitation of the Electorate via Social Media

    Learning to swim in murky seas: Exploitation of the Electorate via Social Media Copyrighted  image Icon Copyright: rawpixel
    Intermediate level Duration 10 mins Updated 19 May 2017
    Learn psychological self-defence and start resisting the dark arts of political communication, in Volker Patent’s second article on Brexit and the General...
  • Seeing the internet

    By Professor Gillian Rose

    How do we see the internet? Gillian Rose explores why some artists and campaigners think it's important that the internet is made more visible.

    Read now: Seeing the internet about Managing projects through people

    Article

    10 mins

    Level: 1 Introductory

    Updated on:

    18 May 2017

  • Seeing the internet

    Introductory level Duration 10 mins Updated 18 May 2017
    How do we see the internet? Gillian Rose explores why some artists and campaigners think it's important that the internet is made more visible.
  • Creative commons image Icon Sam Javanrouh under CC BY-NC 2.0 licence under Creative-Commons license

    What are your chances during a zombie apocalypse?

    By Dr Neil Smith

    According to mathematics we'd all die in a zombie apocalypse but nature and computer science offer us more optimistic outcomes. 

    Read now: What are your chances during a zombie apocalypse? about Managing projects through people

    Article

    Updated on:

    18 May 2017

  • What are your chances during a zombie apocalypse?

    What are your chances during a zombie apocalypse? Creative commons image Icon Sam Javanrouh under CC BY-NC 2.0 licence under Creative-Commons license
    Updated 18 May 2017
    According to mathematics we'd all die in a zombie apocalypse but nature and computer science offer us more optimistic outcomes. 
  • Has media literacy become self-destructive?

    By Danah Boyd

    Danah Boyd, founder of Data & Society, asks if American society has become too distrustful of experts

    Read now: Has media literacy become self-destructive? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    17 May 2017

  • Has media literacy become self-destructive?

    Introductory level Duration 5 mins Updated 17 May 2017
    Danah Boyd, founder of Data & Society, asks if American society has become too distrustful of experts
  • Should the NHS have been better prepared for the cyber-highwaymen?

    The Wannacry malware attack which locked down vital systems throughout much of the NHS on Friday was preventable, explains Conor Deane-McKenna.

    Read now: Should the NHS have been better prepared for the cyber-highwaymen? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    15 May 2017

  • Should the NHS have been better prepared for the cyber-highwaymen?

    Introductory level Duration 5 mins Updated 15 May 2017
    The Wannacry malware attack which locked down vital systems throughout much of the NHS on Friday was preventable, explains Conor Deane-McKenna.
  • How the ZX Spectrum and ZX81 shaped Frank Sidebottom

    Rhys James Jones traces the legendary Frank Sidebottom's roots back to the early days of home computing. (When "computing" was a thing you did, and doing it at home was especially noteworthy.)

    Read now: How the ZX Spectrum and ZX81 shaped Frank Sidebottom about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    19 Apr 2017

  • How the ZX Spectrum and ZX81 shaped Frank Sidebottom

    Introductory level Duration 5 mins Updated 19 Apr 2017
    Rhys James Jones traces the legendary Frank Sidebottom's roots back to the early days of home computing. (When "computing" was a thing you did, and doing it...
  • Why are many African governments wary of social media?

    Much as in Europe, governments in Africa are nervous about how social media might influence the population. Charlotte Cross explores an difficult relationship.

    Read now: Why are many African governments wary of social media? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    13 Apr 2017

  • Why are many African governments wary of social media?

    Introductory level Duration 5 mins Updated 13 Apr 2017
    Much as in Europe, governments in Africa are nervous about how social media might influence the population. Charlotte Cross explores an difficult...
  • Creative commons image Icon hansol under CC-BY licence under Creative-Commons license

    Porn licensing isn't the answer

    By Andrew Smith

    The UK government thinks children can be protected from web porn by building barriers. Good luck with that, says Andrew Smith.

    Read now: Porn licensing isn't the answer about Managing projects through people

    Article

    Updated on:

    30 Mar 2017

  • Porn licensing isn't the answer

    Porn licensing isn't the answer Creative commons image Icon hansol under CC-BY licence under Creative-Commons license
    Updated 30 Mar 2017
    The UK government thinks children can be protected from web porn by building barriers. Good luck with that, says Andrew Smith.
  • Reporting in the fog of an attack

    By Richard Sambrook

    As Channel 4 News showed following the Westminster attacks, it can be easy for even the best journalists to slip up covering a fast-moving story. 

    Read now: Reporting in the fog of an attack about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    28 Mar 2017

  • Reporting in the fog of an attack

    Introductory level Duration 5 mins Updated 28 Mar 2017
    As Channel 4 News showed following the Westminster attacks, it can be easy for even the best journalists to slip up covering a fast-moving story. 
  • What's up with Whatsapp - and should we weaken its security?

    Following the murders in Westminster, UK Home Secretary Amber Rudd appeared to demand that Whatsapp and other messaging systems provide government with a backdoor to listen in. But how does Whatsapp keep users' secrets - and should we be telling...

    Read now: What's up with Whatsapp - and should we weaken its security? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    28 Mar 2017

  • What's up with Whatsapp - and should we weaken its security?

    Introductory level Duration 5 mins Updated 28 Mar 2017
    Following the murders in Westminster, UK Home Secretary Amber Rudd appeared to demand that Whatsapp and other messaging systems provide government with a...
  • Hound hub

    By The OpenLearn team

    Love labradors? Potty about poodles? Explore the Hound hub to find out more about our furry friends.

    Read now: Hound hub about Managing projects through people

    Article

    Updated on:

    14 Mar 2017

  • Hound hub

    Updated 14 Mar 2017
    Love labradors? Potty about poodles? Explore the Hound hub to find out more about our furry friends.
  • Creative commons image Icon The Open University under Creative Commons BY-NC-SA 4.0 license

    Beachbrains

    By Jon hall

    Ever tried to picture how many neurons we have inside our brain but can't envisage it? Use this busy beach analogy to help you understand the brain: 

    Read now: Beachbrains about Managing projects through people

    Article

    10 mins

    Level: 1 Introductory

    Updated on:

    10 Mar 2017

  • Beachbrains

    Beachbrains Creative commons image Icon The Open University under Creative Commons BY-NC-SA 4.0 license
    Introductory level Duration 10 mins Updated 10 Mar 2017
    Ever tried to picture how many neurons we have inside our brain but can't envisage it? Use this busy beach analogy to help you understand the brain:...
  • The Switch tells us a lot about Nintendo

    Nintendo's new console, the Switch, makes perfect sense in light of the company's history, says Brendan Cassidy.

    Watch now: The Switch tells us a lot about Nintendo about Managing projects through people

    Video

    5 mins

    Level: 1 Introductory

    Updated on:

    08 Mar 2017

  • The Switch tells us a lot about Nintendo

    Featuring: Video Video
    Introductory level Duration 5 mins Updated 08 Mar 2017
    Nintendo's new console, the Switch, makes perfect sense in light of the company's history, says Brendan Cassidy.
  • Video

    5 mins

    Level: 1 Introductory

    Updated on:

    15 Feb 2017

  • What is inclusive design and how are Microsoft using it to make the XBox better?

    Featuring: Video Video
    Introductory level Duration 5 mins Updated 15 Feb 2017
    In this short video, Microsoft's XBox team explain how they used inclusive design to improve everyone's social gaming experience.
  • How is the internet helping ensure parliamentary accountability in Bangladesh?

    By Rezwan

    Although Bangladeshi MPs are slow to adopt Facebook and other methods of directy communication with constituents, a new service is closing the gap between representatives and the people.

    Read now: How is the internet helping ensure parliamentary accountability in Bangladesh? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    06 Feb 2017

  • How is the internet helping ensure parliamentary accountability in Bangladesh?

    Introductory level Duration 5 mins Updated 06 Feb 2017
    By Rezwan
    Although Bangladeshi MPs are slow to adopt Facebook and other methods of directy communication with constituents, a new service is closing the gap between...
  • Copyright free  image Icon Copyright free: US Capitol

    Should Trump's tweets be a matter of record?

    When the President deletes a tweet, he's wiping out material of value to historians. Potentially. Shontavia Johnson explains what's at risk.

    Read now: Should Trump's tweets be a matter of record? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    06 Feb 2017

  • Should Trump's tweets be a matter of record?

    Should Trump's tweets be a matter of record? Copyright free  image Icon Copyright free: US Capitol
    Introductory level Duration 5 mins Updated 06 Feb 2017
    When the President deletes a tweet, he's wiping out material of value to historians. Potentially. Shontavia Johnson explains what's at risk.
  • Can we overcome cyber-fatigue to secure ourselves online?

    By Dr Richard Forno

    Richard Forno says focusing on short-term fixes might make us too exhausted to shape a long term solution to the challenges of cybersecurity.

    Read now: Can we overcome cyber-fatigue to secure ourselves online? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    24 Jan 2017

  • Can we overcome cyber-fatigue to secure ourselves online?

    Introductory level Duration 5 mins Updated 24 Jan 2017
    Richard Forno says focusing on short-term fixes might make us too exhausted to shape a long term solution to the challenges of cybersecurity.
  • Is Tinder changing the way the world dates?

    By Livia Gerber

    Research suggests that - far from taking the anxiety out of dating - apps like Tinder introduce a new set of worries.

    Read now: Is Tinder changing the way the world dates? about Managing projects through people

    Article

    5 mins

    Level: 1 Introductory

    Updated on:

    23 Jan 2017

  • Is Tinder changing the way the world dates?

    Introductory level Duration 5 mins Updated 23 Jan 2017
    Research suggests that - far from taking the anxiety out of dating - apps like Tinder introduce a new set of worries.
    Page 6 of 16
    Page 6 of 16
    • 5
    • 6
    • 7