MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 3401-3410 Newer>
Bank Systems & Technology
September 29, 2005
Peggy Bresnick Kendler
Mergers & Acquisitions An interview with five financial industry specialists on technology assets as drivers behind a merger or acquisition and how integrating systems post-merger often presents the biggest challenge to realizing the value of a deal. mark for My Articles 165 similar articles
InternetNews
September 29, 2005
Paul Shread
ILM Not Quite Ready for Prime Time If sessions at this week's Storage Decisions conference are any indication, information lifecycle management technology is a long way from fulfilling its promise. mark for My Articles 124 similar articles
Bank Systems & Technology
September 28, 2005
Elena Malykhina
Work Without Wires The first wave of Capital One's knowledge workers to be outfitted with Wi-Fi-enabled laptops, Voice over IP software phones and portable printers now can do business from anywhere within the company's 24 buildings in the U.S. and the U.K. mark for My Articles 70 similar articles
Bank Systems & Technology
September 28, 2005
Phil Britt
Prim and Proper Without a formal management process, technology projects often veer off track and over budget. But even small banks can benefit from established project management guidelines. mark for My Articles 30 similar articles
Bank Technology News
September 2005
Giving Enterprise Security a Bigger Spotlight Financial IT Security's mission is to provide insight, analysis and commentary about the security challenges before financial institutions - and the innovative technologies and services designed to thwart security breaches. mark for My Articles 438 similar articles
Bank Technology News
September 2005
Shane Kite
Security: Behavior That's Abnormal Banks are getting tough about protecting consumer data from internal and external threats. One of the newest weapons profiles users to identify unusual activity. mark for My Articles 3 similar articles
Bank Technology News
September 2005
Robert Brenner
Business Banking: Bridge Jobs Out Its It To Lure Tech Biz A San Jose-based bank relies heavily on technology outsourcing in its battle to gain market share in California's technology business corridor. It's facing some pretty stiff competition. mark for My Articles 37 similar articles
InternetNews
September 27, 2005
Clint Boulton
Symantec Backup, But With a Veritas Twist Symantec shows off its data protection and security integration work since closing its Veritas purchase. mark for My Articles 244 similar articles
HBS Working Knowledge
September 26, 2005
Kevin Werbach
Dialing in the VoIP Strategic Advantage Since VoIP turns voice into Internet-friendly data packets, it can -- and will -- replace the rigid, packaged phone services that most companies still use. Deployment may be incremental, but companies should be thinking about where VoIP could take them. mark for My Articles 486 similar articles
InternetNews
September 23, 2005
Roy Mark
Senate Turns Attention to Data Privacy The Senate Judiciary Committee expects to vote next week on legislation making it a crime for data brokers to conceal a security breach involving personal data and increasing penalties for computer fraud when the act involves personal data. mark for My Articles 670 similar articles
<Older 3401-3410 Newer>    Return to current articles.