Top results
1 | p a g e c o m m u n i c a t o r j a n u a r y 2 0 1 2 the communicatorthe communicatorthe communicatorthe communicator issue: january 2012 a monthly publication of news…
contacts quick list icons the contacts list is a list of all your saved or imported contacts, filtered by source - e.g. all, microsoft outlook, google, crm salesforce within…
1. apache hacksbeth skwarecki pittsburgh perl workshop 2007-10-13slides and code: http://bethskwarecki.com/ppw2007 2. a simple output filter a horse walks a horse walks into…
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26.…
1.productivity hacks 2. preparation 3. define your 3 mission critical tasks and do them only prioritize the most important task 1. 2. 3. 4. use project management tools…
1.nicolas's hacks#diy #arduino #tdd #ruby #raspberryπ2. 3. orange business service it&l@bs 4. it&l@bs ruby cloud architecture 5. human…
1. golden8 de 9 de 10 dehacks mayo mayo mayorecursos 1 712visitas 250 110
1. parenting hacksyou’ll be mad you didn’t think of them first http://parentsware.com/blog/ view site view blog http://parentsware.com/ photo found…
1. hardware hacking a primer yashin mehaboobe icarus labs ,cspf by mohesh mohan big thanks to 2. why hack hardware? •more interesting •more rewarding…
1. linkedin.com facts – launched in 2003 – 300m users (fb 1.4bn) – 2m groups – 3m company pages . site options: photo, job title, experience, summary, skills, education,…
1. peoplehacks oscon 2007 adam keys http://therealadam.com 2. what are people hacks? peoplehacks sounds evil. manipulative and mean-spirited. like what the cia does in movies.…
1. designing hacks jeremy cimafonte “turns out good design is just a collection of hacks” thursday, september 5, 13 2. who i am. thursday, september 5, 13 3. thursday,…
1. time hacks @russjhammond 2. filter organize use learn information retaincommunicate build on 3. knowledge worker:a person who works exclusively with information 4. 5 practices•…
hacking objective google hacking uses google search to find security holes in the configuration and code that websites use. utilize searches to reveal sensitive information,…
hacking objective google hacking uses google search to find security holes in the configuration and code that websites use. utilize searches to reveal sensitive information,…
1. anywhere james hugman & tom hume hacks & hackers, 8th september 2011monday, 12 september 11 2. fetch the paper while you sleep ready to read in the morningmonday,…
1. urban hacks 都市空間のスキマにおける情報実践 2. 監視・管理などの情報技術が都市空間の設計に組み込まれると、受動的に都市で過ごすよう追い込まれる…
1. matt clare brock university, niagara region, canada brocku.ca/ctlet/about-ctlet/staff http://confluence.sakaiproject.org/display/conf2011/2011-16-15+lms-based+teaching+hacks…
get angie for angellist ( http://j.mp/zfaerw ) follow angie on http://angel.co/angie slides for startup hacks by alex (founder of angie for angellist) presented during mini-seedcamp…