MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 5851-5860 Newer>
Bank Systems & Technology
September 21, 2007
Anne Rawland Gabriel
Jyske Bank Goes Multimedia With IBM Solution Jyske Bank decided that multimedia video technologies would drive its next branch transformation. mark for My Articles 12 similar articles
Bank Systems & Technology
September 20, 2007
Maria Bruno-Britz
Sub-Prime Lending Mess Not Technology's Fault Experts say technology and good decision-making go together in avoiding loan risk. mark for My Articles 512 similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles 183 similar articles
Bank Systems & Technology
September 11, 2007
Maria Bruno-Britz
Central National Bank Finds Growth Opportunities In Prepaid Card Space Its deal with Postilion enables CNB to and process pre-paid cards for other banks and retailers. mark for My Articles 52 similar articles
Bank Systems & Technology
September 9, 2007
Maria Bruno-Britz
KeyBank to Acquire TMS to Grow Educational Services TMS acquisition could help KeyBank stake a bigger claim in the growing educational lending market. mark for My Articles 4 similar articles
Bank Systems & Technology
September 7, 2007
Nancy Feig
Threat Alert Service Extended to Banks Through a partnership with MessageOne, FS-ISAC is now offering the AlertFind security alert service to its financial institution members at a discount. mark for My Articles 4 similar articles
InternetNews
October 5, 2007
Sean Michael Kerner
Fuzzing at 18: Still Crude, Still Effective Throw garbage at an application and what happens? In plenty of cases it'll crash. That method of attack is becoming increasingly popular as a critical component for security researchers and application developers. mark for My Articles 8 similar articles
InternetNews
October 5, 2007
Sean Michael Kerner
Microsoft Relents on WGA Requirement For IE 7 Microsoft yesterday removed the controversial Windows Genuine Advantage validation requirement in the Internet Explorer 7 installation process, thus opening the experience to users of all versions of Windows - including pirated ones. mark for My Articles 429 similar articles
InternetNews
October 4, 2007
Andy Patrizio
Sun Fixes Severe Java Vulnerabilities Holes in Java code could let malicious apps access your file system or your network without your knowledge. mark for My Articles 698 similar articles
InternetNews
October 4, 2007
David Needle
California Government Web Sites Avert Near Disaster That was close. The State of California on Tuesday headed off a near-disastrous shutdown of its top-level domain that would have taken all of the state's government Web sites offline. mark for My Articles 2 similar articles
<Older 5851-5860 Newer>    Return to current articles.