![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczUtc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC85My9lNC9kMC85M2U0ZDA2Zi04YTM4LTViYjEtZmU3MC0zODJlNjAyOWE0Y2EvbXphXzY0ODY0NTk5NDAzMTYyOTYyMTUuanBnLzYwMHg2MDBiYi5qcGc=.jpg)
The Enigma Code
The Enigma Code
18 Dec 2009
•
1hr 5mins
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczItc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC8zNi8xZi84NC8zNjFmODQxNi1lZDI4LTBmNDktZWFjZS1mMzZhYTg3NjE5NGMvbXphXzUxMTExNjUyNTU1NjI1NjMyMjMuanBnLzYwMHg2MDBiYi5qcGc=.jpg)
Campus Website Content Management
Campus Website Content Management
24 Jun 2009
•
2hr 4mins
Similar Podcasts
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczUtc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC8zOS82ZS82Yy8zOTZlNmM4ZC1iYjIzLTRkNDUtODQ3YS00ZmJiM2U1YzI2ZjIvbXphXzcyMTI5NDE4NzYxNzY4NjQ0NjUuanBnLzYwMHg2MDBiYi5qcGc=.jpg)
The Automation of Network Inventory
The Automation of Network Inventory
18 Jun 2009
•
55mins
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczEtc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC8yOC84MC9jNy8yODgwYzdiMi02YjJjLTg0YmYtZTMxMi1kMmQ1OTg5OWYzZDUvbXphXzc0MDEyMTU2MzcxNDMwMjIzMDYuanBnLzYwMHg2MDBiYi5qcGc=.jpg)
Computing Services Conference General Session
Computing Services Conference General Session
18 Jun 2009
•
37mins
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczEtc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC85OC83OC8wOS85ODc4MDk1My05MjMxLWMyNzgtNmQwNC05OTRjZjZiMWMzNTQvbXphXzM2NjI1MDc3MjI1NDY2NzMzNDEuanBnLzYwMHg2MDBiYi5qcGc=.jpg)
High Security Workstation: Seeking a Cost-effective, Productive Solution
High Security Workstation: Seeking a Cost-effective, Productive Solution
18 Jun 2009
•
44mins
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczUtc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC9kMy83My8yMC9kMzczMjAxNy1kYTZkLWRkZWItNjBkNy04MDEyOWIwODNiNDkvbXphXzI0MDQ3NTcxNjk0OTg0NzMzOS5qcGcvNjAweDYwMGJiLmpwZw==.jpg)
IT Security Policy Compliance and Auditing at UC Davis
IT Security Policy Compliance and Auditing at UC Davis
18 Jun 2009
•
48mins
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczItc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC9hZC84ZS9hNC9hZDhlYTQ5ZS04YzA2LWUzOWYtMzE5OS1lMjNkZjM4NTQ4N2QvbXphXzUzNTc0NDQ5NjMxODU5MjA3NDIuanBnLzYwMHg2MDBiYi5qcGc=.jpg)
Secure Sockets Layer Virtual Private Network (SSL VPN): A Look at UC Davis Through the Tunnel
Secure Sockets Layer Virtual Private Network (SSL VPN): A Look at UC Davis Through the Tunnel
18 Jun 2009
•
1hr 7mins
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczQtc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC85MS85Ni81Ni85MTk2NTZlNy1iYjc4LTUwYmMtMDAxMi1lZjBmMzBmYTU2NWQvbXphXzI0NDEwMjgwMDIwNzY5MDYyNjguanBnLzYwMHg2MDBiYi5qcGc=.jpg)
Data Quality in an Emergency Notification System
Data Quality in an Emergency Notification System
18 Jun 2009
•
1hr 1min
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczQtc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC8zZi84Ni84ZC8zZjg2OGRmMi1kNDJjLWYzZTEtZjliNS1kYzJlODI4N2NkZWQvbXphXzQ2MzkyMjM4NzQwNTgyMDgyNTMuanBnLzYwMHg2MDBiYi5qcGc=.jpg)
Enterprise Office 2007 Migration Lessons Learned: How we upgraded 9K systems over one weekend
Enterprise Office 2007 Migration Lessons Learned: How we upgraded 9K systems over one weekend
18 Jun 2009
•
47mins
![Podcast cover](https://cdn-images.owltail.com/200x/jpg/aHR0cHM6Ly9pczItc3NsLm16c3RhdGljLmNvbS9pbWFnZS90aHVtYi9Qb2RjYXN0cy92NC9lNy9jMi83ZC9lN2MyN2RhNy0xNzk1LTg3MzQtMjYxZi03ODNhZWY2NzBmZmMvbXphXzE1NTc1Mjg5MjQzNzUwMDA3NzMuanBnLzYwMHg2MDBiYi5qcGc=.jpg)
Implementing An Extensible Role-Based Security Module in a Java Web Development Framework
Implementing An Extensible Role-Based Security Module in a Java Web Development Framework
18 Jun 2009
•
53mins