MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 2081-2090 Newer>
InternetNews
September 23, 2004
Ryan Naraine
Exploits Circulating for JPEG Flaw Just eight days after Microsoft released a fix for a "critical" flaw in the way JPEG files are processed, researchers have discovered proof-of-concept exploit code that is targeting unpatched machines. mark for My Articles 307 similar articles
InternetNews
September 23, 2004
Erin Joyce
IBM Gearing Up For BPTS In order to serve companies that are looking for answers to serious computing and internal IT problems, IBM has opened a new supercomputing center on its Somers, N.Y. campus called the Center for Business Optimization. mark for My Articles 625 similar articles
InternetNews
September 23, 2004
Susan Kuchinskas
Microsoft Sweetens Licensing Programs Microsoft unwrapped changes to its volume licensing program during a webcast this week, saying it had tweaked the rules to give customers more choice and flexibility. mark for My Articles 172 similar articles
IndustryWeek
October 1, 2004
Doug Bartholomew
Manufacturers Get Smart There's a quiet revolution taking place in how manufacturers approach the use of information technology as a business tool and, ironically, it harkens back to an earlier era of corporate computing -- but with a democratic twist. mark for My Articles 14 similar articles
InternetNews
September 22, 2004
Jim Wagner
.NET, WebSphere Go Head-to-Head in Study A report shows Microsoft's .NET is 'significantly better' than IBM's J2EE-based developer tools, although critics have questioned the methodology of the Microsoft-funded study. mark for My Articles 719 similar articles
InternetNews
September 21, 2004
Ed Sutherland
Security Fears Still Blocking WLAN Adoption A new report says that even though security issues are being addressed, they continue to be the main thing preventing enterprises from going wireless. mark for My Articles 92 similar articles
Wall Street & Technology
September 21, 2004
Robert Hegarty
Measuring Up The best CIOs of today and tomorrow will innovate and help their firms grow again, this time through more efficient (and now, cost-effective) deployment of technology. mark for My Articles 303 similar articles
Wall Street & Technology
September 21, 2004
Beth Bacheldor
Looking for Trouble Under new IT leadership, the U.S. Securities and Exchange Commission is upgrading technology to become a better watchdog and maintain market confidence. mark for My Articles 439 similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles 498 similar articles
InternetNews
September 21, 2004
Ryan Naraine
RSA, VeriSign Take Two-Factor Authentication Onstage Two-factor authentication technology vendors RSA Security and VeriSign took center stage on Tuesday with separate announcements trumping the value of adding another security layer to the existing username/password scheme. mark for My Articles 275 similar articles
<Older 2081-2090 Newer>    Return to current articles.