MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 2531-2540 Newer>
InternetNews
February 9, 2005
Paul Shread
High-Tech Law Firm Relies On InMage Fenwick & West LLP went shopping for a disaster recovery solution and found a smaller company that fit its needs. mark for My Articles 27 similar articles
InternetNews
February 8, 2005
Sean Michael Kerner
Firefox, Others at Phishing Risk A newly reported spoofing flaw puts the browsers' users at risk. mark for My Articles 429 similar articles
InternetNews
February 8, 2005
Jim Wagner
CA Takes 'Intelligent' Approach to Assets Computer Associates' Unicenter Asset Intelligence makes managing enterprise assets a smarter undertaking. mark for My Articles 109 similar articles
InternetNews
February 7, 2005
Colin C. Haley
VoIP Players Form Security Alliance Networkers, software vendors and researchers team up to see that VoIP security keeps pace with adoption. mark for My Articles 528 similar articles
InternetNews
February 7, 2005
Michael Singer
Macromedia's ColdFusion Looks Beyond the Web ColdFusion MX 7 has been re-architected with Java J2EE 1.4 and introduces interactions with mobile phones using short message service (SMS) text messaging as well as standard Web-based instant messaging clients. mark for My Articles 171 similar articles
InternetNews
February 7, 2005
Erin Joyce
Trash-Talking on Grid And SOA Reading the story between Larry Ellison's lines about Oracle's 10g product. mark for My Articles 1430 similar articles
T.H.E. Journal
February 2005
Tricryption Data Security System NEC Solutions (America) Inc. has unveiled a three-layered data encryption solution designed to meet higher education data-privacy regulations while supporting escalating demands for user access to information. mark for My Articles 28 similar articles
T.H.E. Journal
February 2005
Patrick Hinojosa
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. mark for My Articles 112 similar articles
T.H.E. Journal The Center for Information Assurance and Security (CIAS) CIAS has been founded at the University of Texas at Austin to address the nation's growing problems with cyber security. mark for My Articles 13 similar articles
PC Magazine
March 22, 2005
The Lookout: Acrobat Bugs Adobe Systems Inc. has warned of two serious security flaws affecting Microsoft Windows, Mac OS X, and Unix versions of its Acrobat software. mark for My Articles 507 similar articles
<Older 2531-2540 Newer>    Return to current articles.