ID | Interpret | Skladba | Album | |
1. | Chad J. Kainz | Drywall, Wireless, and Course Management: Rethinking the Campus Learning Environment | EDUCAUSE - Annual Conference - 2005 | |
2. | Chris Alberts | Rethinking Risk Management | CERT's Podcasts for Business Leaders | |
3. | Stephen Downes | Learning Networks and the Personal Learning Environment | | |
4. | Peter Dunbar-Hall | Rethinking music teaching and learning | Twilight Lecture Series | |
5. | Peter Dunbar-Hall | Rethinking music teaching and learning | Twilight Lecture Series | |
6. | Chris Alberts | Rethinking Risk Management - Part 3: Dealing with Preventable Failures | CERT's Podcasts for Business Leaders | |
7. | Chris Alberts | Rethinking Risk Management - Part 1: Why Traditional Approaches Fall Short | CERT's Podcasts for Business Leaders | |
8. | Chris Alberts | Rethinking Risk Management - Part 2: Managing Risks across the Life Cycle; Using the Mosaic Toolkit | CERT's Podcasts for Business Leaders | |
9. | Wesley A. Fryer | Podcast142: Rethinking Teaching: How Online Learning Can and Should Completely Alter Your View of Education | Moving at the Speed of Creativity Podcasts | |
10. | Host Dale Kutnick and Guest Amrit Williams | The Changing Vulnerability Management Environment | Gartner Voice | |
11. | Host Dale Kutnick and Guest Amrit Williams | The Changing Vulnerability Management Environment | Gartner Voice | |
12. | Host Dale Kutnick and Guest Amrit Williams | The Changing Vulnerability Management Environment | Gartner Voice | |
13. | Host Bob Hafner and Guest Phillip Redman | Wireless Contract Management & Negotiation | Gartner Voice | |
14. | Host Dale Kutnick and Guest Rachna Ahlawat | Implementing Wireless Security & Management | Gartner Voice | |
15. | Host Dale Kutnick and Guest Rachna Ahlawat | Implementing Wireless Security & Management | Gartner Voice | |
16. | Host Bob Hafner and Guest Phillip Redman | Wireless Contract Management & Negotiation | Gartner Voice | |
17. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
18. | Anita Crotty | Converging the library and learning management systems | VALA 2006 | |
19. | Simon Jentzsch, Jacqueline Paczko | Learning Management System mit zielgruppenspezifischen Lernoberflächen | Chemnitzer Linux-Tage 2006 | |
20. | Simon Jentzsch, Jacqueline Paczko | Learning Management System mit zielgruppenspezifischen Lernoberflächen | Chemnitzer Linux-Tage 2006 | |
21. | Simon Jentzsch, Jacqueline Paczko | Learning Management System mit zielgruppenspezifischen Lernoberflächen | Chemnitzer Linux-Tage 2006 | |
22. | Adam Finkelstein, Laura Winer | The Matrix Transformed: Achieving Better Focus and Insight in Learning Management System Selection | EDUCAUSE 2005 Annual Conference | |
23. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
24. | Total Picture Radio with Peter Clayton | Margaret Morford Management Courage - Part 2 - There is No Magic Management Formula | Total Picture Radio with Peter Clayton | |
25. | Prime Point Foundation | Corporate Management Strategies - Part VI - Crisis Management | Pod Universal - Podcast on subjects of interest | |
26. | Wesley A. Fryer | Podcast327: Using Digital Technologies and Personal Learning Networks to Enhance Learning by Clif Mims | Moving at the Speed of Creativity Podcasts | |
27. | Ruth Clark | Efficiency in Learning: Applying Cognitive Load Theory to E-Learning | | |
28. | Stephen Clarke | How Learning Technologies Are Affecting the Design of Learning Spaces | EDUCAUSE - Annual Conference - 2005 | |
29. | Lisa Goldman, Judah Passow | Rethinking the Media | Jewish Book Week 2008 | |
30. | Don Miller | Rethinking Relationships | The Veritas Forum at Harvard University | |