MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 4531-4540 Newer>
Insurance & Technology
August 10, 2006
Maria Woehr
Fulfilling Agent Requests As part of a strategy to facilitate growth and be more competitive in commercial auto, The Hanover Insurance Group is providing its independent agents with an enhanced version of its point-of-sales system - POS Avenues Commercial Auto system. mark for My Articles 60 similar articles
Insurance & Technology
August 10, 2006
Maria Woehr
Policy Roundup To get its Combosurance product to market as quickly as possible, Investors Heritage developed a new universal life product using COSS Life Illustrations. mark for My Articles 9 similar articles
InternetNews
August 11, 2006
Andy Patrizio
Passing The Tech Torch: Who Will Run? Stumble? Many technology companies have great leaders, but what about their Plan B? mark for My Articles 377 similar articles
BusinessWeek
August 21, 2006
Steve Hamm
Heading Off The Hackers Microsoft pulls out the stops to boost security. mark for My Articles 142 similar articles
InternetNews
August 10, 2006
Andy Patrizio
To Patch Or Not To Patch? Microsoft issues a fix to a severe hole. The government insists we use it, but is there a risk? mark for My Articles 501 similar articles
InternetNews
August 10, 2006
Roy Mark
Top Dem Blasts Latest VA Data Loss U.S. Senate minority leader Harry Reid wasted little time finding fault with the Veterans Administration's latest security breach, calling for the resignation of VA Secretary Jim Nicholson. mark for My Articles 63 similar articles
InternetNews
August 9, 2006
Sean Michael Kerner
Hacking The Dead Cow Yet another malware search engine debuts, but this one doesn't entirely rely on Google. mark for My Articles 127 similar articles
InternetNews
August 9, 2006
Ed Sutherland
Bugs in Your BlackBerry Software could be first exploit tailored to the BlackBerry e-mail device. mark for My Articles 327 similar articles
InternetNews
August 9, 2006
Michael Hickins
Novell's Sentinel Watches Over Your Network Novell incorporates the Sentinel security perks from its e-Security purchase. mark for My Articles 355 similar articles
T.H.E. Journal
August 2006
Doug Gale
Can This Virus Be 'Rooted' Out? A new kind of hard-to-detect malware is increasing our vulnerability to hackers and creating headaches for makers of antiviral software. mark for My Articles 208 similar articles
<Older 4531-4540 Newer>    Return to current articles.