ID | Interpret | Skladba | Album | |
1. | BeyeNETWORK | Inmon's Hierarchy of Needs for Information Technology, Part 2 | Audio Article | |
2. | BeyeNETWORK | Inmon's Hierarchy of Needs for Information Technology, Part 1 | Audio Article | |
3. | Jon Allen, Robert Paul Hartland | Security Assessments for Information Technology | EDUCAUSE 2005 Annual Conference | |
4. | ECT News Network | Information Asymmetry: Shattered by Technology | Tech Business Commentary From E-Commerce Times Columnist Ted di Stefano | |
5. | Christine Tyler & Jackie Wilson | Information Technology at Purdue's Job Family System | EDUCAUSE 2006 Annual Conference | |
6. | EDUCAUSE | The Role of Information Technology in an Age of Access, Affordability, and Accountability | 2007 Annual Conference | |
7. | Anand S. Dighe, M.D., Ph.D. | Information Technology as a Key Enabler for Enhanced Automation in the Core Laboratory | LabInfoTech Summit 2009 | |
8. | INSEAD | INSEAD Knowledgecast n°43: Global information technology report: Making progress | INSEAD Knowledgecast | |
9. | Dr. Ego, init | Culture, Politix and Information Technology - Report from Plug'n'Politx in Zurich Outlook | | |
10. | Dr. Ego, (Sara ,) init | Culture, Politix and Information Technology - Report from Plug'n'Politx in Zurich Outlook | | |
11. | Strategic News Service, LLC. | Using Supercomputers and Supervisualization Techniques: A conversation with Larry Smarr, Director, California Institute for Telecommunications and Information Technology, and Harry E. Gruber Professor | 2006 Future In Review (FiRe) Conference Mediacast | |
12. | Dave Evans | Part II: The Technology Avalanche | News@Cisco | |
13. | Marshall Masters | Did Moses Use Alien Technology to Part the Red Sea? | KOLBRIN.COM | |
14. | Editorial Team | Technology or Business - Chicken or the Egg, Part 2 | 6078 | |
15. | The Case for Investing in Business Analytics Technology | Part 3: Business Analytics Technology Portfolio | SAS Podcast | |
16. | Bill Wilson | Using Standards to Build an Information Security Program - Part 2: Getting Started | CERT’s Podcasts for Business Leaders | |
17. | University of Hawaii | Cancer Information Service Tips for losing holiday weight, part 1 | University Report | |
18. | University of Hawaii | Cancer Information Service Tips for losing holiday weight, part 2 | University Report | |
19. | University of Hawaii | Cancer Information Service Tips for losing holiday weight, part 1 | University Report | |
20. | University of Hawaii | Cancer Information Service Tips for losing holiday weight, part 2 | University Report | |
21. | dziant | For example, download contact information, containing phone number and/or address from all airline companies in the city of your choice and make sure, you always have the information when you need it. | www.dziant.com | |
22. | Fr. Chad Ripperger, F.S.S.P. | Hierarchy in Heaven | | |
23. | Edward J. Reiter, Mount Zion F | Hierarchy of Armor | Copyright 2005 | |
24. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
25. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
26. | BBC Schools GCSE Bitesize | Settlement: Shopping hierarchy | Geography | |
27. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
28. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
29. | Dr Monica Janowski | Potency, Hierarchy and Food in Borneo | Resonance FM Podcast | |
30. | Dr Monica Janowski | Potency, Hierarchy and Food in Borneo | Resonance FM Podcast | |