Information Politics and Information Culture: A Case Study.doc
The Intellectual History of IT Business Value
SCSC 455 Computer Security Chapter 4 Key Distribution and User Authentication Dr. Frank Li.
Member Learning Winter 2011, Wk 8 Agenda [3 minutes] Pre-survey on the IATI [5 minutes] ACT, the “Not” Scandal, and CIDA [15 minutes] What is the IATI.
Guided Inquiry
Introduction to Metadata
Modest Maemo Summit 09
Cellular devices (Kyoungwoo)
An Information System For Tum Tums presentation-3
Tranzlogix Global Solutions - Logistics Optimization
Serendipity
Dennis Lee UX Portfolio