| Old Articles: <Older 4041-4050 Newer> |
 |
Insurance & Technology April 6, 2006 Maria Woehr |
Cover Your Assets Insurers must focus on internal risk management rather than depend on the Terrorism Risk Insurance Act, which is set to expire in two years, to mitigate losses from a terrorist attack, according to Risk Management Solutions.  |
Insurance & Technology April 6, 2006 Deena M. Amato-McCoy |
Reaching New Product Heights By deploying rules-based engines that centralize enterprise data, carriers can streamline the information shared among internal departments and foster collaboration during the product design and introduction processes.  |
Insurance & Technology April 5, 2006 Phil Britt |
Go With the Flow Amica Mutual Insurance simplified its network security architecture and minimized downtime with a scalable solution from Crossbeam Systems.  |
Insurance & Technology April 5, 2006 Maria Woehr |
True Insight To monitor performance of Web applications on agent and employee portals, OneBeacon Insurance used Coradiant's TrueSight monitoring equipment.  |
Insurance & Technology April 5, 2006 Lisa Valentine |
Transparent Technology Jim Hanson's IT team at Mutual of Omaha has provided so much value that organizations outside of insurance are asking the company to provide IT services for them as well.  |
Insurance & Technology April 5, 2006 Maria Woehr |
Call Forward Promises of cost savings, enhanced customer service and improved business continuity are driving insurers to make the switch to VoIP.  |
Insurance & Technology April 5, 2006 Maria Woehr |
Sign Me Up Although all insurers look to improve efficiency through straight-through processing, empower agents with the latest technologies and enhance customer service, many have yet to implement a seemingly obvious efficiency: e-signatures.  |
Insurance & Technology April 5, 2006 Anthony O'Donnell |
UnumProvident Shifts to ACS A changing outsourcing market has led UnumProvident Corp. to modify what and how much it outsources, and to terminate its IT outsourcing contract with IBM in favor of a five-year, $84 million deal with Dallas-based ACS.  |
InternetNews April 7, 2006 Tim Scannell |
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens.  |
InternetNews April 7, 2006 Ed Sutherland |
Microsoft to Cover IE Exploit A fix for a widely exploited flaw in Internet Explorer is among five security patches Microsoft told users to expect next week.  |
| <Older 4041-4050 Newer> Return to current articles. |