MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 4481-4490 Newer>
InternetNews
August 1, 2006
Rounding the Corners of Network Security The ins, outs and arounds of key security trends. mark for My Articles 299 similar articles
InternetNews
August 1, 2006
Michael Hickins
The Word on E-mail Authentication In a step that should help slash the volume of unwanted and pernicious e-mail, a group developing technical specs for the e-mail authentication standard DKIM, has just completed a major portion of its work. mark for My Articles 46 similar articles
InternetNews
August 1, 2006
Clint Boulton
IBM, AMD Hope to Cool Off Your Computers Partners IBM and AMD unveil five new machines and new cooling techniques to keep costs down in the datacenter. mark for My Articles 1035 similar articles
CRM
August 2006
Marshall Lager
Try It, You'll Like It Nailing sales end-user buy-in has been a long-standing challenge for organizations that decide to implement a CRM system. Here, how to gain compliance and what to watch for. mark for My Articles 729 similar articles
CRM
August 2006
Coreen Bailor
The Why Factor in Speech Analytics Don't allow the customer information that lies in recorded calls to go unreported and unnoticed - incorporating speech analytics can help improve business areas throughout the enterprise. mark for My Articles 254 similar articles
CRM
July 1, 2006
Coreen Bailor
Clicking the Tires By launching its eStara deployment, the Chrysler Group converted up to 20% of click to call prospects into customers, compared to 10% of all callers using traditional marketing materials. mark for My Articles 112 similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles 127 similar articles
InternetNews
July 31, 2006
Michael Hickins
BI: Garbage Out, Trust In Business Objects is introducing a product suite designed to improve data quality and help companies comply with the U.S.A. Patriot Act. mark for My Articles 206 similar articles
InternetNews
July 31, 2006
Sean Michael Kerner
A New Open Source Approach to Weakness Fortify's Seven Pernicious Kingdoms is a new way to categorize Web vulnerabilities. mark for My Articles 53 similar articles
Bank Systems & Technology
July 28, 2006
Paul McDougall
ING Group Latest to Tap an Outsourcing Tag Team Banking and insurance conglomerate ING Group has handed over a number of computer maintenance and support operations to a team of outsourcers under five-year deals worth a total of about $1.02 billion. mark for My Articles 221 similar articles
<Older 4481-4490 Newer>    Return to current articles.