Loading…
The Texas Two-Step
Austin, Texas is a cool town. I hadn't had an excuse to visit Austin for several years, so I was pleased to accept a chance to teach a couple classes at an IT conference there. I knew I would find an excuse to slip out one evening to hear good live music at a place like The Broken Spoke. I was...
Saved in:
Published in: | Security technology & design 2008-04, Vol.18 (4), p.58 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 4 |
container_start_page | 58 |
container_title | Security technology & design |
container_volume | 18 |
creator | McCumber, John |
description | Austin, Texas is a cool town. I hadn't had an excuse to visit Austin for several years, so I was pleased to accept a chance to teach a couple classes at an IT conference there. I knew I would find an excuse to slip out one evening to hear good live music at a place like The Broken Spoke. I was musing about the options when I noticed the conference attendees shuffling in with their conference bags stuffed with marketing slicks and complimentary pens, mouse pads and other vendor-labeled doo-dads. |
format | article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_232156447</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A178941842</galeid><sourcerecordid>A178941842</sourcerecordid><originalsourceid>FETCH-LOGICAL-g707-9e6fccae4bf8a355e41498749df15e896d64909475fea089caa1d553d00205823</originalsourceid><addsrcrecordid>eNotjMtKAzEUQLNQsFY3fkF3rgJ53LyWpfiCgguzH66Zm3EkTupkin6-hbo6cDicC7aSwgYuvYArdt3apxDaWQkrdhc_aBPpF9sm_lT-ttDhhl1mLI1u_7lm8fEh7p75_vXpZbfd88EJxwPZnBISvGeP2hgCCcE7CH2WhnywvYUgAjiTCYUPCVH2xuheCCWMV3rN7s_bw1y_j9SW7mtsiUrBieqxdUoraSyAO5X8XA5YqBunXJcZ00ATzVjqRHk86a10PoD0oPQfX2lDLg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>232156447</pqid></control><display><type>article</type><title>The Texas Two-Step</title><source>Criminology Collection</source><source>Nexis UK</source><source>Social Science Premium Collection (Proquest) (PQ_SDU_P3)</source><creator>McCumber, John</creator><creatorcontrib>McCumber, John</creatorcontrib><description>Austin, Texas is a cool town. I hadn't had an excuse to visit Austin for several years, so I was pleased to accept a chance to teach a couple classes at an IT conference there. I knew I would find an excuse to slip out one evening to hear good live music at a place like The Broken Spoke. I was musing about the options when I noticed the conference attendees shuffling in with their conference bags stuffed with marketing slicks and complimentary pens, mouse pads and other vendor-labeled doo-dads.</description><identifier>ISSN: 1069-1804</identifier><language>eng</language><publisher>Park Ridge: Cygnus Business Media</publisher><subject>Conferences ; Effectiveness ; Information technology ; Security management</subject><ispartof>Security technology & design, 2008-04, Vol.18 (4), p.58</ispartof><rights>COPYRIGHT 2008 Cygnus Business Media</rights><rights>Copyright Cygnus Business Media Apr 2008</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/232156447?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21416,21434,33612,33770,43733,43814</link.rule.ids></links><search><creatorcontrib>McCumber, John</creatorcontrib><title>The Texas Two-Step</title><title>Security technology & design</title><description>Austin, Texas is a cool town. I hadn't had an excuse to visit Austin for several years, so I was pleased to accept a chance to teach a couple classes at an IT conference there. I knew I would find an excuse to slip out one evening to hear good live music at a place like The Broken Spoke. I was musing about the options when I noticed the conference attendees shuffling in with their conference bags stuffed with marketing slicks and complimentary pens, mouse pads and other vendor-labeled doo-dads.</description><subject>Conferences</subject><subject>Effectiveness</subject><subject>Information technology</subject><subject>Security management</subject><issn>1069-1804</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><sourceid>ALSLI</sourceid><sourceid>BGRYB</sourceid><sourceid>M0O</sourceid><recordid>eNotjMtKAzEUQLNQsFY3fkF3rgJ53LyWpfiCgguzH66Zm3EkTupkin6-hbo6cDicC7aSwgYuvYArdt3apxDaWQkrdhc_aBPpF9sm_lT-ttDhhl1mLI1u_7lm8fEh7p75_vXpZbfd88EJxwPZnBISvGeP2hgCCcE7CH2WhnywvYUgAjiTCYUPCVH2xuheCCWMV3rN7s_bw1y_j9SW7mtsiUrBieqxdUoraSyAO5X8XA5YqBunXJcZ00ATzVjqRHk86a10PoD0oPQfX2lDLg</recordid><startdate>20080401</startdate><enddate>20080401</enddate><creator>McCumber, John</creator><general>Cygnus Business Media</general><general>Endeavor Business Media</general><scope>0-V</scope><scope>3V.</scope><scope>4T-</scope><scope>7RQ</scope><scope>7WY</scope><scope>7XB</scope><scope>883</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGRYB</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>M0F</scope><scope>M0O</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>U9A</scope></search><sort><creationdate>20080401</creationdate><title>The Texas Two-Step</title><author>McCumber, John</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g707-9e6fccae4bf8a355e41498749df15e896d64909475fea089caa1d553d00205823</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Conferences</topic><topic>Effectiveness</topic><topic>Information technology</topic><topic>Security management</topic><toplevel>online_resources</toplevel><creatorcontrib>McCumber, John</creatorcontrib><collection>ProQuest Social Sciences Premium Collection</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>Career & Technical Education Database</collection><collection>ABI/INFORM Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Trade & Industry (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Social Science Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Criminology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Trade & Industry</collection><collection>Criminal Justice Database</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><jtitle>Security technology & design</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>McCumber, John</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Texas Two-Step</atitle><jtitle>Security technology & design</jtitle><date>2008-04-01</date><risdate>2008</risdate><volume>18</volume><issue>4</issue><spage>58</spage><pages>58-</pages><issn>1069-1804</issn><abstract>Austin, Texas is a cool town. I hadn't had an excuse to visit Austin for several years, so I was pleased to accept a chance to teach a couple classes at an IT conference there. I knew I would find an excuse to slip out one evening to hear good live music at a place like The Broken Spoke. I was musing about the options when I noticed the conference attendees shuffling in with their conference bags stuffed with marketing slicks and complimentary pens, mouse pads and other vendor-labeled doo-dads.</abstract><cop>Park Ridge</cop><pub>Cygnus Business Media</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1069-1804 |
ispartof | Security technology & design, 2008-04, Vol.18 (4), p.58 |
issn | 1069-1804 |
language | eng |
recordid | cdi_proquest_miscellaneous_232156447 |
source | Criminology Collection; Nexis UK; Social Science Premium Collection (Proquest) (PQ_SDU_P3) |
subjects | Conferences Effectiveness Information technology Security management |
title | The Texas Two-Step |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T17%3A05%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Texas%20Two-Step&rft.jtitle=Security%20technology%20&%20design&rft.au=McCumber,%20John&rft.date=2008-04-01&rft.volume=18&rft.issue=4&rft.spage=58&rft.pages=58-&rft.issn=1069-1804&rft_id=info:doi/&rft_dat=%3Cgale_proqu%3EA178941842%3C/gale_proqu%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-g707-9e6fccae4bf8a355e41498749df15e896d64909475fea089caa1d553d00205823%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=232156447&rft_id=info:pmid/&rft_galeid=A178941842&rfr_iscdi=true |