MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 10231-10240 Newer>
CIO
June 14, 2011
Stephanie Overby
How to Tame Negotiation Nerves Anxiety can lead to unfavorable outcomes at the IT bargaining table. Here are some ways to take the edge off. mark for My Articles 35 similar articles
CIO
June 13, 2011
Bill Bulkeley
What CFOs Care About Besides Your IT Budget CFOs need to understand more than the costs and financial benefits to adopting cloud and consumer technologies. They're also on the hook to protect against risk mark for My Articles 777 similar articles
CIO
June 13, 2011
Joe Eng
How Do You Generate Innovative Ideas? Highlight Examples From Your Team If you want to encourage innovation, try rewarding those who take the initiative to solve problems, no matter how small. mark for My Articles 113 similar articles
CIO
June 13, 2011
Stephanie Overby
No. 1 Gripe with Outsourcers: Lousy Service An outsourcing survey finds CIOs need to improve vendor management. mark for My Articles 664 similar articles
CIO
June 13, 2011
Juan Carlos Perez
Collaboration: What's Your Enterprise Social Networking Style? Socialtext is pushing integration of social networking technologies with enterprise applications. But CIOs have to decide whether that approach makes sense for their companies. mark for My Articles 46 similar articles
Information Today
June 13, 2011
Theresa Cramer
Turning Data into Better Decisions With Endeca Latitude 2 With its latest announcement today, June 13, Endeca Technologies, Inc., aims to make business intelligence (BI) more agile with Endeca Latitude 2, the latest major release of the company's enterprise agile business intelligence platform mark for My Articles 67 similar articles
PC Magazine
June 13, 2011
Eric Griffith
How To Hide Your Data Want to keep your private files under wraps without making it obvious they're important? Rather than encryption, try hiding them, so prying eyes don't even know they exist. mark for My Articles 692 similar articles
The Motley Fool
June 12, 2011
Anders Bylund
There's Another Buyout Wave Coming A bushel of large companies have seen their systems hacked or attacked recently. Will this trigger a second round of security company buyouts? mark for My Articles 33 similar articles
CIO
May 16, 2011
Nancy Gohring
Starbucks Shares Lessons of Going Mobile An Android app and the ability to order a drink from a mobile phone are coming soon, an executive from Starbucks said as he shared lessons and tips from his company's experience offering mobile applications. mark for My Articles 770 similar articles
InternetNews
June 9, 2011
Oracle Patches Java for 17 Vulns It's time to update your Java installation. mark for My Articles 643 similar articles
<Older 10231-10240 Newer>    Return to current articles.