"Say what you will about the “fairness” of individual referees, or the many different “political...
08:21
"Say what you will about the “fairness” of individual referees, or the many different “political...
08:21
Revenue Assurance: What's Next
"Clearly revenue assurance has greatly increased in scope over the past few years. Revenue...
07:00
[120] Some Assembly Required: How to Build A Program of Assessment
In this episode: KeyLIME LIVE guest co-host Eric J Warm selects a narative review by medical...
25:50
01/15/2017 Jordan Rice Series: By Faith Title: The Nature of Faith Scripture: Hebrews 11:1-6...
The Lord's Supper Delivers Assurance of Salvation
Fake News is sometimes dangerous news, Dylan Roof is sentenced to death for church shooting,...
1/29/17 Jordan Rice Series: By Faith Title: The Life of Faith Scripture: Hebrews 11:8-12 Faith...
Jesus Cures Our Doubts -- Luke 24:36-45
Luke 24:36-45. People have so much confidence in things that are uncertain and so little...
Am I Really Saved?! The Nature of True Saving Faith (Luke 17:11-19)
This message was given by Pastor Ray Causly II on March 19, 2017. Tags: assurance, faith, leper,...
Doctor, Who? - Luke 01 - Jesus Was Good News
What is the gospel? What were the gospels of the New Testament? Who is Luke? Why should we listen...
Are You Mistaken About Assurance?
Santa Fe Archdiocese opens up about child sexual abuse, Mainline Protestants get some good...
Episode 48 - The Problem with NetBIOS
Wireless RFID encryption, CarderIM, Banker Trojans, Cisco NAC vulnerabilities, data encryption,...
15:52
Episode 47 - Ad Hoc Wireless Networks
Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide...
18:10
Episode 46 - Security Leadership
Bot driven spam, discretionary faxing, quantum leaps, Oracle security, 7 habits of effective...
18:34
Episode 45 - Keep your eye on the data
Vendor bullying, AV software evaluation, Fuzzing, new SPP issue, kernel malware, and data protection
18:46
Episode 44 - Virtual Server Security
Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST...
20:08
Commentary on iPods as criminal tools, users are not stupid, AJAX vulnerability monitoring,...
17:04
Episode 42 - Stepping up to meet security challenges
Commentary on iPods in business, security as a process, and how some programming teams are...
09:17
Customer Welfare vs. Vendor Public image, Establishing System Assurance, Cyber-espionage.
18:16