ID | Interpret | Skladba | Album | |
61. | Host Jeff Comport and Guest Joseph Feiman | Measuring Application Development Effectiveness | Gartner Voice | |
62. | Host Jeff Comport and Guest Joseph Feiman | Measuring Application Development Effectiveness | Gartner Voice | |
63. | Rym & Scott:The Front Row Crew | GeekNights 070423 - Application Repositories | GeekNights 2 | |
64. | Immanuel Kant | 10 - Application of the Categories to Objects of the Senses | The Critique of Pure Reason | |
65. | David Tesar | IE 8 Application Compatibility webcast with demos | IE 8 Application Compatibility webcast with demos | |
66. | Michael Johnson | The Myth of Bandwidth and Application Performance | F5 Networks Incorporated - powered by PodTech.net | |
67. | Sandra Jeffries and Corey Wallis | Exploring the application of RSS for library staff | | |
68. | Inside Digital Media with Phil Leigh | “Visual Bookshelf” Application for Facebook | Incredible Film Music Box | |
69. | Inside Digital Media with Phil Leigh | “Visual Bookshelf” Application for Facebook | Incredible Film Music Box | |
70. | Symantec Corporation | Podcast - Strategies to Increase Application Availability | Podcast - Symantec Enterprise Solutions Channel | |
71. | Business Intelligence Network | The Transition from Spreadsheet Budgets to a Packaged Application | 6753 | |
72. | Bryan MS | Application Compatibility Considerations with Windows Vista | | |
73. | A.W. Tozer | The Personal Application of Christ's Coming Into the World | John | |
74. | Chuck Willis and Rohyt Belani | Web Application Incident Response and Forensics: A Whole New Ball Game! | Black Hat USA 2006 | |
75. | Steve Gibson with Leo Laporte | Security Now 55: Application Sandboxes - Sponsored by Astaro Corp. | Security Now August 2006 | |
76. | William Robertson | Static Enforcement of Web Application Integrity Through Strong Typing | Security 09 | |
77. | Interwoven's GearUp Podcast | Session Preview: Achieve Automated Application Provisioning | podcast@interwoven.com | |
78. | Interwoven's GearUp Podcast | Conference Highlights: Composite Application Provisioning Solutions | podcast@interwoven.com | |
79. | Steve Gibson with Leo Laporte | Security Now 55: Application Sandboxes - Sponsored by Astaro Corp. | Security Now August 2006 | |
80. | Hari Kannan | Hardware Enforcement of Application Security Policies Using Tagged Memory | OSDI '08 | |
81. | CMC Media | CM Today Includes Application Lifecycle Management Conference 2007 | | |
82. | Blain Barton | TechNet Webcast: Application Compatibility Considerations with Windows Vista | | |
83. | Hari Kannan | Hardware Enforcement of Application Security Policies Using Tagged Memory | OSDI '08 | |
84. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
85. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
86. | CMC Media | CM Today Includes Compuware Delivers Greater Application Development Productivity From the Web to the Mainframe With Uniface 9.1 | | |
87. | Benko | MSDN Webcast: Integrating Office Data Analysis and Charting Tools into a Client Application | | |
88. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application | CERT's Podcasts for Business Leaders | |
89. | Information Security Media Group | Information Security Media Group Interview with Application Security, Inc. | InfoSecurity NY 2007 | |
90. | Irving Wladawsky-Berger | Lecture 05: Operationalizing the strategy - key internal factors; Market and application segmentation, internal measurements, management reviews | MIT OCW: ESD.57 Technology-based Business Transformation, Fall 2007 | |