MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 1901-1910 Newer>
CRM
August 2004
Emmy Favilla
CRM in Action: Triangle Brick Builds Sales in a Stagnant Market The site has helped the company reduce costs associated with maintaining a physical showroom and improved the company's ability to provide up-to-date information to its customers. mark for My Articles 6 similar articles
CRM
August 2004
Jason Compton
How to...choose the right metrics for determining ROI Four keys to evaluating the success of your CRM investment. mark for My Articles 563 similar articles
CRM
August 2004
Evan Natelson
Unishippers Invests $6 Million in Customer Relationships System helps Unishippers' customers manage their cash flow better by billing them according to their needs. mark for My Articles 115 similar articles
InternetNews
July 30, 2004
Ryan Naraine
'Critical' IE Patch Released Microsoft goes out-of-cycle to fix software flaws that led to last month's malware attack. mark for My Articles 685 similar articles
InternetNews
July 30, 2004
Ryan Naraine
Check Point Patches Buffer Overflows A buffer overflow vulnerability in Check Point's virtual private network (VPN) products could put users at risk of network takeover, the company warned in an advisory. mark for My Articles 126 similar articles
InternetNews
July 30, 2004
Craig McGuire
In Focus: VoIP Need help making sense of the VoIP hype? Quick stats, fast facts about VoIP. mark for My Articles 629 similar articles
InternetNews
July 30, 2004
Sean Michael Kerner
Research Says Linux Servers Mostly Hack-Free Research shows majority of Linux servers are never infected or hacked. mark for My Articles 1089 similar articles
Wall Street & Technology
July 28, 2004
Jim Middlemiss
Gone Phishing In the latest identity-theft scam, fraudulent e-mails trick individuals into coughing up passwords to 'secure' financial data. mark for My Articles 295 similar articles
Wall Street & Technology
July 28, 2004
Jim Middlemiss
CIO Challenge Wireless holds tremendous potential for financial-services firms, but implementing it across an enterprise is no easy task. Organizations must determine the best applications of the technology, find a way to integrate it with their legacy systems and then secure it all. mark for My Articles 9 similar articles
Wall Street & Technology
July 28, 2004
Gil Makleff
Transparency in Tech Spending Transparency in spending corporate funds has been - until recently - "nice to have." The change from "nice to have" to "need to have now" has been well publicized, on the heels of fraud cases like those involving Enron and Worldcom, and it has crystallized in the form of the Sarbanes-Oxley Act of 2002. mark for My Articles 54 similar articles
<Older 1901-1910 Newer>    Return to current articles.