Scientific Reproducibility from an Informatics Perspective
Confidential data management_key_concepts
Rerproducibility from an infomatics perspective
Acronis User Manual
Presenter(s): Candace Soderston Matt Sargent Bill Yock Date:November 16, 2011 Time:2:30 to 3:30 pm Help Shape the Future of Open Source Identity and Access.
Steganography in digital media. Steganography is sometimes called - Secret writing - Concealed writing - Covert communication - Stealth communication.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
July 25, 2005 PEP Workshop, UM 2005 1 A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
Google Docs and Wikis March 6, 2012 Effective Use of Technology Sub-Committee (LTO – DMP – Library) #RUweb20.
Be Safe, Be Smart
Google Docs and Wikis February 1, 2012. Google Tools Google began as a simple search engine in 1996. Around 2001, Google began developing new areas of.
Put a Lock on It: Protecting your online privacy A project of Consumer Action | .