MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 2441-2450 Newer>
InternetNews
January 18, 2005
Sean Michael Kerner
PredatorWatch Prowling For CVEs In a bid to help companies protect themselves against common threats listed on CVEs, PredatorWatch launched Auditor 16, a plug-and-play appliance that deploys the company's SmartScan technology in order to scan and audit up to 16 IP address. mark for My Articles 4 similar articles
CIO
January 15, 2005
Message Therapy Many CIOs thought they had nailed e-mail systems in the '90s and could move on to more important things, but Sarbanes-Oxley, HIPAA and other regulations have moved e-mail management to the top of CIOs' agendas. mark for My Articles 100 similar articles
InternetNews
January 17, 2005
Susan Kuchinskas
Sun Offers Nailed-Down RFID For Retail New industry-specific reference architecture unveiled at national retailing show. mark for My Articles 492 similar articles
InternetNews
January 17, 2005
Jim Wagner
CA Modifies Desktop DNA Computer Associates (CA) is about to take the wraps off its new Unicenter Desktop DNA r11, the first update of its desktop management offering since it bought Miramar Systems in March 2004. mark for My Articles 47 similar articles
PC Magazine
January 12, 2005
Sebastian Rupley
The Virus Wars--In Your Palm Build a big user base and the malicious-code writers will come. That's the logic that analysts and security software companies alike are following as they warn that smartphones and other mobile devices will become significant targets for security threats in 2005. mark for My Articles 663 similar articles
PC Magazine
January 12, 2005
David A. Karp
Build an XP-SP2 Recovery Disc The recovery disc that came with your PC is likely obsolete and useless. mark for My Articles 606 similar articles
PC Magazine
January 12, 2005
Dennis Fisher
Scammers Exploit Anti-Phishing Weapon Phishing scammers continue to claim victims, recently damaging the reputa- tion of the most promising technology deployed to thwart them. mark for My Articles 235 similar articles
PC Magazine
January 12, 2005
Larry Seltzer
Bogus Security Warnings When a warning pops up unexpectedly as you're surfing, take your time before responding. mark for My Articles 164 similar articles
PC Magazine
January 12, 2005
Neil J. Rubenking
Cleaning Up After Windows XP Hotfixes If you've followed PC Magazine's recommendations, your system is now configured to accept Windows updates automatically. mark for My Articles 359 similar articles
InternetNews
January 14, 2005
Clint Boulton
Data Protection Play Nets Investor Interest Venture capitalists like how start-up Revivio uses continuous data protection to save customers' data from loss and corruption. mark for My Articles 18 similar articles
<Older 2441-2450 Newer>    Return to current articles.