MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 3521-3530 Newer>
CIO
November 1, 2005
Karen J. Bannan
A Way to Make Computers Think In a bid to help systems -- especially manufacturing systems -- work more autonomously, the National Institute of Standards and Technology has released new process specification language software that allows users to more precisely define a business process. mark for My Articles 1 similar article
CIO
November 1, 2005
Michael Jackman
Spies in the Server Closet To skirt the Supreme Court's ruling last year against file-sharing networks, some programmers have announced they would pursue private, invitation-only networks -- so-called darknets. But they might also be courting a new channel for corporate espionage. mark for My Articles 26 similar articles
CIO
November 1, 2005
Ben Worthen
How Wal-Mart Beat Feds to New Orleans Companies -- Wal-Mart and Starbucks among them -- that had procedures in place for quick communications were able to be "first responders" when Hurricane Katrina struck the Gulf Coast this Fall. mark for My Articles 266 similar articles
CIO
November 1, 2005
Robert McMillan
Clicking, Clacking and Snooping Researchers at the University of California, Berkeley have found a way to turn the clicks and clacks of typing on a computer keyboard into a startlingly accurate transcript of what is being typed -- and showed that note even 'random' passwords are secure. mark for My Articles 69 similar articles
CIO
November 1, 2005
Meridith Levinson
A New Frontier for CIOs in Corporate Ops Today, the prospects for CIOs who wish to take on broader management duties are looking brighter. mark for My Articles 662 similar articles
CIO
November 1, 2005
China Martens
Thumbs Up for that Open-Source App A university, a startup and Intel are pushing for a standard model to rate open-source software. the objective? To provide users with a better sense of whether the more than 100,000 open-source projects available today are fit for their particular purpose. mark for My Articles 51 similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles 195 similar articles
InternetNews
October 31, 2005
Jim Wagner
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks. mark for My Articles 94 similar articles
InternetNews
October 31, 2005
Jim Wagner
McAfee Strengthens Foundstone Arm McAfee is adding regulatory compliance safeguards and a new remote management appliance to its Foundstone line of products. mark for My Articles 108 similar articles
Wall Street & Technology
October 28, 2005
Customized Managed Security Services Cybertrust can help a company build and implement a secure operations center (SOC) in-house or provide a co-sourced, "virtual" SOC that allows the customer to define the co-sourcing relationship. mark for My Articles 6 similar articles
<Older 3521-3530 Newer>    Return to current articles.