| Old Articles: <Older 341-350 Newer> |
 |
CIO March 1, 2002 Stephanie Overby |
The Artist's Way A profile of James Albert, CIO of the San Francisco Municipal Railway Department...  |
CIO March 1, 2002 Christopher Lindquist |
Kalido Kalido, a spinoff of Royal Dutch/Shell Group, is looking to help companies -- and their applications -- stay on the pace...  |
CIO March 1, 2002 Christopher Lindquist |
Collaborate with Anything Instead of selling you a collaborative application, Advanced Reality wants to make your existing apps collaborate...  |
CIO March 1, 2002 Fred Hapgood |
Virtually Productive Manufacturing process simulation can pay big benefits...  |
IndustryWeek March 1, 2002 Doug Bartholomew |
Maximizing ERP Manufacturers extend enterprise resource planning's value with links to manufacturing execution systems, business information...  |
CIO February 15, 2002 Abbie Lundberg |
Response Ability How do you respond to a computer security incident?  |
CIO February 15, 2002 Scott Berinato |
Finally, a Real Return on Security Spending Learn why it's so hard to define the return on security investment; Read how economists are attempting to quantify those returns; Learn how the numbers will fundamentally change infosecurity. For years CIOs have had to use scare tactics and other soft arguments to justify an investment in security. Now, for the first time, they may be able to get numbers they need to show a measurable ROI.  |
CIO February 15, 2002 Simone Kaplan |
Smooth Selling Ahead Empire Blue Cross and Blue Shield slashed its sales cycle from 27 days to just two or three with the help of sales-force automation software.  |
CIO February 15, 2002 |
Solution: Get What You Need, Not What You Want - Problem: Budgetary Constraints How a small city uses wireless to monitor its pumps.  |
CIO February 15, 2002 |
Solution: Secure Socket Layer Encryption - Problem: Security Hospitals have to be very careful to protect the privacy of their data. How can security be ensured when transmitting data wirelessly? CareGroup Healthcare System is using SSL and network card address checking on top of wired equivalent privacy (WEP).  |
| <Older 341-350 Newer> Return to current articles. |