| Old Articles: <Older 481-490 Newer> |
 |
CIO July 15, 2002 Derek Slater |
Get in Touch with Your Inner CFO How can the CIO and CFO quit arguing and come together? Who better to tell us than leaders who have lived both roles simultaneously.  |
CIO July 15, 2002 Simone Kaplan |
KM the Right Way A step-by-step approach that will ensure that your expensive knowledge management system actually gets used. Learn how to judge whether your organization is ready for KM.  |
CIO July 15, 2002 Mohanbir Sawhney |
Damn the ROI, Full Speed Ahead "Show me the money" may not be the right demand for e-business projects.  |
CIO July 15, 2002 Alice Dragoon |
CIO: Automated In this era of e-mail, e-commerce and e-procurement, the advent of eCIO software was almost inevitable. After all, the superhero stamina and crystal vision required of a CIO are just the sorts of things that cry out for automation and Web-enablement.  |
CIO July 15, 2002 Megan Santosus |
Check It Out As codirector of the Productivity from Information Technology initiative at MIT's Sloan School of Management in Cambridge, Mass., Gupta has been researching ways to streamline the check payment process using IT.  |
CIO July 15, 2002 Sarah Johnson |
Privacy Opt-In or Cop-Out? CIOs will have more to worry about if a controversial bill that lets consumers sue companies that misuse their information continues to move through Congress.  |
CIO July 15, 2002 Jeff Fields |
The Mix and Match Method A CIO in the insurance business shares his success with a management approach that relies on rotating IT staff around for different projects.  |
Inc. July 1, 2002 Anne Stuart |
IM Is Here. RU Ready 2 Try It? Instant messages -- those cryptic little on-line conversations -- are traveling from teenagers' computers into businesses like yours.  |
Inc. June 13, 2002 Anne Stuart |
IM Legal Primer Instant messaging is evolving into a serious business tool -- with serious legal and security risks as well.  |
PC World July 11, 2002 David Legard |
Serious Security Flaw Found in Outlook, IE Researchers say hole could allow hackers to read files and execute programs on vulnerable PCs.  |
| <Older 481-490 Newer> Return to current articles. |