MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 5631-5640 Newer>
Wall Street & Technology
July 26, 2007
Anna Ewing Innovates Trading at Nasdaq The stock market's EVP of Operations and Technology and CIO discusses past work experiences, what's next in exchange industry IT, 2008 initiatives and her top three current IT projects. mark for My Articles 46 similar articles
Wall Street & Technology
July 26, 2007
Lauren Paul
Edwin Marcial Makes Improvements at ICE Intercontinental Exchange's CTO and SVP discusses his mentors, what's next in industry tech issues, 2008 initiatives and his top three current IT projects. mark for My Articles 18 similar articles
Wall Street & Technology
July 22, 2007
Lauren Paul
Steve Rubinow Leads NYSE Group Hybrid Market Rollout The exchange giant's CIO discusses his mentors, past work experiences, what's next in industry IT, 2008 initiatives, and his top three current IT projects. mark for My Articles 51 similar articles
Linux Journal
July 1, 2007
Richard Bullington-McGuire
Mambo Exploit Blocked by SELinux A real-world case where Security-Enhanced Linux proved its worth. SELinux prevented the attacker from executing the second stage of the attack, possibly preventing a root compromise. mark for My Articles 59 similar articles
InternetNews
August 3, 2007
Nicholas Carlson
The Semantic Web Goes to Work You better figure out what the Semantic Web is and soon, because its concepts have graduated from academia and are starting to contribute to your competitor's bottom line. mark for My Articles 58 similar articles
InternetNews
August 3, 2007
Sean Michael Kerner
How The iPhone Was Cracked The Mac OS may be far less secure than most think it is. mark for My Articles 989 similar articles
InternetNews
August 3, 2007
Sean Michael Kerner
Security Is All in Your Head Bruce Schneier explains the psychology of security to Black Hats. mark for My Articles 10 similar articles
InternetNews
August 3, 2007
Sean Michael Kerner
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. mark for My Articles 28 similar articles
InternetNews
August 2, 2007
Sean Michael Kerner
Windows Vista Gets Another Dose of The 'Blue Pill' A Black Hat hacker proves more than just a Blue Pill can stymie Windows Vista. mark for My Articles 89 similar articles
InternetNews
August 2, 2007
Sean Michael Kerner
Web Services Secure But Flawed Security researcher argues that most Web Services security implementations are vulnerable to attack, and he shows a Black Hat audience exactly where to look. mark for My Articles 68 similar articles
<Older 5631-5640 Newer>    Return to current articles.