ID | Interpret | Skladba | Album | |
181. | Win Treese | Specializing General-Purpose Computing: A New Approach to Designing Clusters for High-Performance Technical Computing | 2007 USENIX Annual Technical Conference | |
182. | Win Treese | Specializing General-Purpose Computing: A New Approach to Designing Clusters for High-Performance Technical Computing | 2007 USENIX Annual Technical Conference | |
183. | Win Treese | Specializing General-Purpose Computing: A New Approach to Designing Clusters for High-Performance Technical Computing | 2007 USENIX Annual Technical Conference | |
184. | CMC Media | CM Today Includes Philips Medical Systems Leverages Open Source Principles of the CollabNet® Solution for Its Development Environment | | |
185. | Steve Holden (sholden@pobox.com) | TECH NEWS RADIO #307 | 060926 | HONEYPOT, SHAREPOINT, PROGRAMMING, OPEN SOURCE, GATEWAYS, SPARKLINE, AJAX SECURITY TOOLS, SAMETIME | www.technewsradio.com | |
186. | Chuck Joiner | MacNotables #735 5/31/07 The MacNotables' Analysis of Microsoft's Open Source Intimidation | MacNotables - The Mac Experts You Want To Hear From | |
187. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
188. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
189. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
190. | Mary Ann Davidson | Developing Secure Software: Universities as Supply Chain Partners - Part 1: The Software Security Knowledge Gap | CERT's Podcasts for Business Leaders | |
191. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 4: Software Process and Raising Awareness | CERT’s Podcasts for Business Leaders | |
192. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 1: Buying vs. Building Software | CERT's Podcasts for Business Leaders | |
193. | Wesley A. Fryer | Podcast266: Open Minds, Open Education, and a View of Open Culture by David Thornburg | Moving at the Speed of Creativity Podcasts | |
194. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 1: Errors in Medical Care as an Analogy for Errors in Software | CERT's Podcasts for Business Leaders | |
195. | Elder William R. Walker | Can You Be Trusted? | New Era November 2006 | |
196. | One Star Hotel | Cant Be Trusted | | |
197. | Forty Winks | The Day I Trusted You | Sweet Sweet Frenzy EP | |
198. | Bad Friend | I Trusted You | Previously Unreleased | |
199. | BeyeNETWORK | When Data Can't Be Trusted | Audio Article | |
200. | The Promise Ring | I Never Trusted The Russians | The Horse Latitudes | |