MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 3501-3510 Newer>
InternetNews
October 26, 2005
Clint Boulton
Vendors Forge Web Services Security Group Microsoft and IBM lead a new committee within OASIS to cement security for exchanging Web services software. mark for My Articles 21 similar articles
InternetNews
October 24, 2005
Tim Gray
Companies Bid for Authentication Compliance Work Financial institutions are getting started on security compliance regulations. mark for My Articles 262 similar articles
BusinessWeek
October 24, 2005
Timothy J. Mullaney
Protecting Patients' Privacy President Bush's health-tech czar has a plan to ensure that health records stored on a national network don't fall into the wrong hands. mark for My Articles 254 similar articles
HBS Working Knowledge
October 24, 2005
Nolan & McFarlan
Building an IT Governance Committee A company that decides it needs board-level IT oversight must do three things: Select the appropriate members and the chairman, determine the group's relationship to the audit committee, and prepare the charter. mark for My Articles 253 similar articles
Entrepreneur
November 2005
Nichole L. Torres
Right to Write? Protect your company's good name in employees' blogs. mark for My Articles 119 similar articles
Entrepreneur
November 2005
Amanda C. Kooser
Wind Surfing Go green with a solar - or wind-powered web host. mark for My Articles 616 similar articles
InternetNews
October 21, 2005
Tim Gray
FIMA Looks Toward Interoperability The Financial Services Instant Messaging Association held a roundtable to discuss issues of interoperability and the future of enterprise instant messaging. mark for My Articles 347 similar articles
InternetNews
October 21, 2005
Marty Foltyn
The State of ILM Best Practices Information lifecycle management practices are still evolving, but there are some steps storage users can take to get started. mark for My Articles 39 similar articles
InternetNews
October 20, 2005
Sean Michael Kerner
Snort's Intrusion System Blows a Hole US-CERT issued an advisory this week warning that the open source Snort intrusion detection system had a highly critical buffer overflow vulnerability that could allow an attacker to execute arbitrary code. mark for My Articles 100 similar articles
InternetNews
October 20, 2005
Jim Wagner
Slew of Patches From Oracle Oracle issued its latest batch of security patches affecting its software products Wednesday. mark for My Articles 1808 similar articles
<Older 3501-3510 Newer>    Return to current articles.