MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 4521-4530 Newer>
InternetNews
August 8, 2006
Ed Sutherland
Microsoft Patches Newest 'Dirty Dozen' Microsoft released 12 patches aimed at resolving multiple security risks discovered in its operating system and popular Office suite. mark for My Articles 665 similar articles
InternetNews
August 8, 2006
Roy Mark
More Missing Data at VA Unisys discloses desktop computer containing personal info on as many as 38,000 veterans is missing. mark for My Articles 90 similar articles
InternetNews
August 7, 2006
Clint Boulton
EMC Shakes Security, Content Management Cocktail EMC is offering a combination of content management software from its Documentum acquisition and security software from its Authentica buy to help customers protect their information that gets outside the corporate firewall. mark for My Articles 363 similar articles
InternetNews
August 7, 2006
Sean Michael Kerner
Black Hat 2006: 'l33t' or 'Lame?' Was the Black Hat security conference a wake-up call for enterprises or just a snoozer? mark for My Articles 61 similar articles
Bio-IT World
Jul/Aug 2006
Mark D. Uehling
RIP, Data Managers? Do people working in data management at drug discovery firms have a future? mark for My Articles 24 similar articles
Bio-IT World
Jul/Aug 2006
Nosa Omoigui
Going Beyond Search for the Enterprise Beyond standard search, technology exists to bring knowledge discovery to the desktops of life science workers. Understanding the difference between standard search retrieval and true knowledge discovery is an important step in helping knowledge workers gain insight and grapple with larger universal health and medical issues. mark for My Articles 99 similar articles
Bio-IT World
Jul/Aug 2006
Chris Dwan
Power Users It is imperative to put a decent user interface in front of CPUs and get some good use out of them, rather than simply burning fossil fuels for no reason. We should be making use of the features built into every modern chip for going idle, if not spinning down completely during inactive periods. mark for My Articles 42 similar articles
InternetNews
August 4, 2006
Sean Michael Kerner
Black Hat Takes Vista to Task Microsoft brings its Windows Vista to the security conference. Attendees put it to the test. mark for My Articles 226 similar articles
InternetNews
August 4, 2006
Sean Michael Kerner
Browser Cache: Goodies For Hackers Black Hat session reveals that it's not just Trojans and keyloggers you should watch out for. mark for My Articles 239 similar articles
InternetNews
August 4, 2006
Roy Mark
Data Breaches And Congress A roundup of where federal data breach security laws stand. mark for My Articles 493 similar articles
<Older 4521-4530 Newer>    Return to current articles.