Index of /applify2022/Compress-Ing/2022/05

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[IMG]1-1024x341.jpg2022-11-09 08:23 32K 
[IMG]1-150x150.jpg2022-11-09 08:23 7.0K 
[IMG]1-300x100.jpg2022-11-09 08:23 6.2K 
[IMG]1-768x256.jpg2022-11-09 08:23 22K 
[IMG]1.jpg2022-11-09 08:23 33K 
[IMG]2-1024x341.jpg2022-11-09 08:23 24K 
[IMG]2-150x150.jpg2022-11-09 08:23 5.4K 
[IMG]2-300x100.jpg2022-11-09 08:23 4.7K 
[IMG]2-768x256.jpg2022-11-09 08:23 16K 
[IMG]2.jpg2022-11-09 08:23 27K 
[IMG]3-1024x341.jpg2022-11-09 08:23 26K 
[IMG]3-150x150.jpg2022-11-09 08:23 6.1K 
[IMG]3-300x100.jpg2022-11-09 08:23 5.4K 
[IMG]3-768x256.jpg2022-11-09 08:23 18K 
[IMG]3.jpg2022-11-09 08:23 26K 
[IMG]ap-3-2-copy.jpg2022-11-09 08:23 38K 
[IMG]ap-3-3-copy.jpg2022-11-09 08:23 48K 
[IMG]ap-3-4-copy.jpg2022-11-09 08:23 36K 
[IMG]ap-4-1-copy.jpg2022-11-09 08:23 117K 
[IMG]ap-4-2-copy.jpg2022-11-09 08:23 42K 
[IMG]ap-4-3-copy.jpg2022-11-09 08:23 36K 
[IMG]ap-4-4-copy.jpg2022-11-09 08:23 32K 
[IMG]Cybersecurity-1024x341.jpg2022-11-09 08:23 19K 
[IMG]Cybersecurity-150x150.jpg2022-11-09 08:23 4.2K 
[IMG]Cybersecurity-300x100.jpg2022-11-09 08:23 4.4K 
[IMG]Cybersecurity-768x256.jpg2022-11-09 08:23 14K 
[IMG]Cybersecurity-Risk-1024x341.jpg2022-11-09 08:23 29K 
[IMG]Cybersecurity-Risk-150x150.jpg2022-11-09 08:23 6.6K 
[IMG]Cybersecurity-Risk-300x100.jpg2022-11-09 08:23 5.9K 
[IMG]Cybersecurity-Risk-768x256.jpg2022-11-09 08:23 20K 
[IMG]Cybersecurity-Risk.jpg2022-11-09 08:23 29K 
[IMG]Cybersecurity.jpg2022-11-09 08:23 20K 
[IMG]featured-1024x576.jpg2022-11-09 08:23 42K 
[IMG]featured-150x150.jpg2022-11-09 08:23 4.6K 
[IMG]featured-300x169.jpg2022-11-09 08:23 10K 
[IMG]featured-768x432.jpg2022-11-09 08:23 29K 
[IMG]featured.jpg2022-11-09 08:23 78K 
[IMG]How-Does-Technical-Debt-Pose-a-Cybersecurity-Risk-1024x576.jpg2022-11-09 08:23 35K 
[IMG]How-Does-Technical-Debt-Pose-a-Cybersecurity-Risk-150x150.jpg2022-11-09 08:23 5.4K 
[IMG]How-Does-Technical-Debt-Pose-a-Cybersecurity-Risk-300x169.jpg2022-11-09 08:23 9.8K 
[IMG]How-Does-Technical-Debt-Pose-a-Cybersecurity-Risk-768x432.jpg2022-11-09 08:23 24K 
[IMG]How-Does-Technical-Debt-Pose-a-Cybersecurity-Risk.jpg2022-11-09 08:23 67K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-1-1024x341.jpg2022-11-09 08:23 29K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-1-150x150.jpg2022-11-09 08:23 6.3K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-1-300x100.jpg2022-11-09 08:23 6.3K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-1-768x256.jpg2022-11-09 08:23 20K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-1.jpg2022-11-09 08:23 30K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-2-1024x341.jpg2022-11-09 08:23 27K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-2-150x150.jpg2022-11-09 08:23 6.2K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-2-300x100.jpg2022-11-09 08:23 5.9K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-2-768x256.jpg2022-11-09 08:23 20K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-2.jpg2022-11-09 08:23 28K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-3-1024x341.jpg2022-11-09 08:23 28K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-3-150x150.jpg2022-11-09 08:23 6.4K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-3-300x100.jpg2022-11-09 08:23 5.9K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-3-768x256.jpg2022-11-09 08:23 20K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-3.jpg2022-11-09 08:23 28K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-main-1024x576.jpg2022-11-09 08:23 26K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-main-150x150.jpg2022-11-09 08:23 4.0K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-main-300x169.jpg2022-11-09 08:23 8.0K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-main-768x432.jpg2022-11-09 08:23 18K 
[IMG]Offshore-v-Nearshore-v-Onshore-Poster-main.jpg2022-11-09 08:23 48K 
[IMG]Technical-Debt-1024x341.jpg2022-11-09 08:23 26K 
[IMG]Technical-Debt-150x150.jpg2022-11-09 08:23 5.1K 
[IMG]Technical-Debt-300x100.jpg2022-11-09 08:23 5.0K 
[IMG]Technical-Debt-768x256.jpg2022-11-09 08:23 17K 
[IMG]Technical-Debt.jpg2022-11-09 08:23 24K 

Apache/2.4.18 (Ubuntu) Server at 35.154.162.195 Port 80