| Old Articles: <Older 1611-1620 Newer> |
 |
InternetNews May 26, 2004 Ryan Naraine |
Korgo Worm Targets LSASS Flaw The detection of a new network worm is a clear indication that users have still not applied Microsoft's MS04-011 update.  |
InternetNews May 26, 2004 Colin C. Haley |
Outsourcing's Stumbling Block When outsourcing goes bad, there's usually a simple reason why.  |
InternetNews May 25, 2004 Robyn Greenspan |
Realtors' Tech Budgets Exceed Marketing Real estate professionals are spending more on technology products, services, and training to improve productivity and enhance business offerings.  |
InternetNews May 25, 2004 Ryan Naraine |
Microsoft Revamps Product Lifecycle Support Effective June 1, Microsoft will expand its enterprise product support lifecycle policy by a minimum of three years.  |
InternetNews May 25, 2004 Ryan Naraine |
Windows XP SP2 Inches Closer Microsoft moves to squash some last-minute bugs and meet the deadline for a full release of the Windows security overhaul.  |
Registered Rep. May 25, 2004 John Churchill |
Trust, Innovation, Results On the surface, TowerGroup's 10th annual financial services technology conference was all about tangible ways banks and brokerages can improve their business. But one intangible issue lurked just beneath every speaker's words: trust.  |
InternetNews May 24, 2004 Erin Joyce |
CeBIT Ready to Cut IT's Gordian Knot Enterprise IT is loosening the purse strings, but decision-making for the enterprise is the hot topic in New York this week.  |
HBS Working Knowledge May 24, 2004 Nicholas Carr |
Spend Less on IT Forget information technology innovation and investment. Executives must now rely on risk management and cost control. An excerpt from the new book, Does IT Matter?  |
InternetNews May 24, 2004 Michael Singer |
Data Center Group Issues Utility Computing Spec The DCML wants to make utility computing a reality separate from the vision of rivals HP, IBM, Sun and VERITAS.  |
Entrepreneur June 2004 Mike Hogan |
Not-So-Good Fellas Keep the bad guys at bay with these steps to improve your company's computer security. You can also try out these resources and Web sites for secure computing.  |
| <Older 1611-1620 Newer> Return to current articles. |